๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Digital Watermarking and Steganography: Fundamentals and Techniques

โœ Scribed by Frank Y. Shih


Publisher
CRC Press
Year
2017
Tongue
English
Leaves
293
Edition
2
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.

โœฆ Table of Contents


Content: Chapter One: Introduction 1.1 Digital Watermarking 1.2 Digital Steganography 1.3 Differences between Watermarking and Steganography 1.4 A Brief History References Appendix: Selected List of Books on Watermarking and Steganography Chapter Two: Classification in Digital Watermarking 2.1 Classification based on Characteristics 2.2 Classification based on Applications References Chapter Three: Mathematical Preliminaries 3.1 Least Significant Bit (LSB) Substitution 3.2 Discrete Fourier Transform (DFT) 3.3 Discrete Cosine Transform (DCT) 3.4 Discrete Wavelet Transform (DWT) 3.5 Random Sequence Generation 3.6 Chaotic Map 3.7 Error Correction Code 3.8 Set Partitioning in Hierarchical Tree (SPIHT) References Chapter Four: Digital Watermarking Fundamentals 4.1 Spatial Domain Watermarking 4.2 Frequency Domain Watermarking 4.3 Fragile Watermark 4.4 Robust Watermark References Chapter Five: Watermarking Attacks and Tools 5.1 Image Processing Attacks 5.2 Geometric Attack 5.3 Cryptographic Attack 5.4 Protocol Attack 5.5 Watermarking Tools 5.6 An Efficient Block-based Fragile Watermarking System for Tamper Localization and Recovery References Chapter Six: Combinational Domain Digital Watermarking 6.1 Overview of Combinational Watermarking 6.2 Watermarking in the Spatial Domain 6.3 The Watermarking in the Frequency Domain 6.4 Experimental Results 6.5 Further Encryption of Combinational Watermarking References Chapter Seven: Watermarking Based on Genetic Algorithm 7.1 Introduction to the Genetic Algorithm 7.2 Concept of GA-Based Watermarking 7.3 GA-based Rounding Error Correction Watermarking 7.4 An Application to Medical Image Watermarking 7.5 Authentication of JPEG Images based on Genetic Algorithms References Chapter Eight: Adjusted-Purpose Digital Watermarking 8.1 An Adjusted-Purpose Digital Watermarking Technique 8.2 An Adjusted-Purpose Watermarking Technique by Particle Swarm Optimization References Chapter Nine: High Capacity Watermarking 9.1 Robust High Capacity Digital Watermarking 9.2 High-Capacity Multiple Regions of Interest Watermarking for Medical Images References Chapter Ten: Reversible Watermarking 10.1 A Reversible Image Authentication Scheme based on Chaotic Fragile Watermark 10.2 Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram Modification References Chapter Eleven: Steganography and Steganalysis 11.1 Steganography 11.2 Steganalysis References Chapter Twelve: Steganography Based on Genetic Algorithm and Differential Evolution 12.1 Steganography Based on GA 12.2 Steganography Based on DE References


๐Ÿ“œ SIMILAR VOLUMES


Digital Watermarking and Steganography :
โœ Shih, Frank Y ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› CRC Press ๐ŸŒ English

Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applica

Digital Watermarking and Steganography:
โœ Frank Y. Shih ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Taylor & Francis;CRC Press ๐ŸŒ English

<P>This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is esp

Information Hiding Techniques for Stegan
โœ Stefan Katzenbeisser ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐ŸŒ English

A thorough review of steganography, the history of this previously neglected element of cryptography, a description of possible applications, and a survey of methods you can use to hide information in modern media. DLC: Cryptography.

Information Hiding Techniques for Stegan
โœ Stefan Katzenbeisser ๐Ÿ“‚ Library ๐Ÿ“… 1999 ๐ŸŒ English

A thorough review of steganography, the history of this previously neglected element of cryptography, a description of possible applications, and a survey of methods you can use to hide information in modern media. DLC: Cryptography.