Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applica
Digital Watermarking and Steganography: Fundamentals and Techniques, Second Edition
โ Scribed by Frank Y. Shih
- Publisher
- Taylor & Francis;CRC Press
- Year
- 2017
- Tongue
- English
- Leaves
- 276
- Edition
- 2ed.
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.
โฆ Table of Contents
Content: Chapter One: Introduction1.1 Digital Watermarking 1.2 Digital Steganography1.3 Differences between Watermarking and Steganography1.4 A Brief HistoryReferencesAppendix: Selected List of Books on Watermarking and SteganographyChapter Two: Classification in Digital Watermarking2.1 Classification based on Characteristics2.2 Classification based on ApplicationsReferencesChapter Three: Mathematical Preliminaries3.1 Least Significant Bit (LSB) Substitution3.2 Discrete Fourier Transform (DFT)3.3 Discrete Cosine Transform (DCT)3.4 Discrete Wavelet Transform (DWT)3.5 Random Sequence Generation3.6 Chaotic Map3.7 Error Correction Code3.8 Set Partitioning in Hierarchical Tree (SPIHT)ReferencesChapter Four: Digital Watermarking Fundamentals4.1 Spatial Domain Watermarking4.2 Frequency Domain Watermarking4.3 Fragile Watermark4.4 Robust WatermarkReferencesChapter Five: Watermarking Attacks and Tools5.1 Image Processing Attacks5.2 Geometric Attack5.3 Cryptographic Attack5.4 Protocol Attack5.5 Watermarking Tools5.6 An Efficient Block-based Fragile Watermarking System for Tamper Localization and RecoveryReferencesChapter Six: Combinational Domain Digital Watermarking6.1 Overview of Combinational Watermarking6.2 Watermarking in the Spatial Domain6.3 The Watermarking in the Frequency Domain6.4 Experimental Results6.5 Further Encryption of Combinational WatermarkingReferencesChapter Seven: Watermarking Based on Genetic Algorithm7.1 Introduction to the Genetic Algorithm7.2 Concept of GA-Based Watermarking7.3 GA-based Rounding Error Correction Watermarking7.4 An Application to Medical Image Watermarking7.5 Authentication of JPEG Images based on Genetic AlgorithmsReferencesChapter Eight: Adjusted-Purpose Digital Watermarking8.1 An Adjusted-Purpose Digital Watermarking Technique8.2 An Adjusted-Purpose Watermarking Technique by Particle Swarm OptimizationReferencesChapter Nine: High Capacity Watermarking9.1 Robust High Capacity Digital Watermarking9.2 High-Capacity Multiple Regions of Interest Watermarking for Medical ImagesReferencesChapter Ten: Reversible Watermarking10.1 A Reversible Image Authentication Scheme based on Chaotic Fragile Watermark10.2 Reversible Data Hiding Techniques Using Multiple Scanning Difference Value Histogram ModificationReferencesChapter Eleven: Steganography and Steganalysis11.1 Steganography11.2 SteganalysisReferencesChapter Twelve: Steganography Based on Genetic Algorithm and Differential Evolution12.1 Steganography Based on GA12.2 Steganography Based on DEReferences
โฆ Subjects
Digital watermarking;Data encryption (Computer science);Computer security;Multimedia systems -- Security measures;Intellectual property
๐ SIMILAR VOLUMES
<P>This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is esp
A thorough review of steganography, the history of this previously neglected element of cryptography, a description of possible applications, and a survey of methods you can use to hide information in modern media. DLC: Cryptography.
A thorough review of steganography, the history of this previously neglected element of cryptography, a description of possible applications, and a survey of methods you can use to hide information in modern media. DLC: Cryptography.