Front cover image for Informed watermarking

Informed watermarking

This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion.
eBook, English, ©2002
Kluwer Academic Publishers, Boston, ©2002
1 online resource
9781402070716, 1402070713
1012458869
1. Introduction.- 2. General Concepts and State-of-the-Art.- 2.1 A General Model of Digital Watermarking.- 2.2 Restrictions and Simplifications.- 2.3 Stochastic Modeling of Digital Watermarking.- 2.4 Performance Evaluation of Digital Watermarking.- 2.5 Spread-Spectrum Watermarking.- 2.6 Exploiting Side Information at the Encoder.- 2.7 A Game-Theoretic Approach to Digital Watermarking.- 3. Information Embedding into IID Signals Facing an AWGN Attack.- 3.1 Scalar Costa Scheme.- 3.2 Theoretical Performance Analysis.- 3.3 High-Rate SCS Communication.- 3.4 Low-Rate SCS Communication.- 3.5 Inverse SCS.- 3.6 Detection of Information Embedded with SCS.- 3.7 Chapter Summary.- 4. Digital Watermarking: A Game between Embedder and Attacker.- 4.1 Watermarking of IID Signals.- 4.2 Watermarking of Non-IID Signals.- 4.3 Step Size and Offset Estimation for SCS.- 4.4 Chapter Summary.- 5. Applications.- 5.1 Watermarking of Chemical Structure Sets.- 5.2 Watermarking of digital images.- 5.3 Chapter Summary.- 6. Summary, Conclusions, and Outlook.- 6.1 Communication Exploiting Side Information.- 6.2 The Game Between Watermark Embedder and Attacker.- 6.3 Applications for Digital Watermarking.- 6.4 Future Research Topics.- Appendices.- A Properties of SCS Transmission.- A. 1 Dithered Quantization.- A.2 PDF of extracted SCS information after AWGN attacks.- A.3 Derivation Details for Inverse SCS Mapping.- A.4 SCS Watermarking Facing Scalar Quantization Attacks.- B Solution of the Watermarking Game for Sawn Attacks.- C Optimization of Attack Strategy for Fixed Embedding Strategy.- C. 1 Optimization in Case of ICS Watermarking.- C.2 Optimization in Case of SS Watermarking.- C.3 Optimization in Case of ST-SCS Watermarking.- D Optimization of the Embedding Strategy.- D. 1 Optimized Embedding and Attack for ICS Watermarking.- D.2 Optimized Embedding and Attack for SS Watermarking.- D.3 Optimized Embedding and Attack for ST-SCS Watermarking.- E Test Images and Additional Results.- E. 1 Original Images.- E.2 Additional Image Statistics.- E.3 ST-SCS Watermark Capacities for Image Data.- References.
archive.org Free eBook from the Internet Archive
openlibrary.org Additional information and access via Open Library