1st Edition

Digital Watermarking and Steganography Fundamentals and Techniques

By Frank Y. Shih Copyright 2008
    200 Pages 137 B/W Illustrations
    by CRC Press

    Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography:

    • Demonstrates how to develop and implement methods to guarantee the authenticity of digital media
    • Explains the categorization of digital watermarking techniques based on characteristics as well as applications
    • Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system

    The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security.

    Introduction
    Digital Watermarking
    Digital Steganography
    Differences between Watermarking and Steganography
    A Brief History
    Appendix: Selected List of Books on Watermarking and Steganography
    Classification in Digital Watermarking
    Classification Based on Characteristics
    Classification Based on Applications
    Mathematical Preliminaries 
    Least-Significant-Bit Substitution
    Discrete Fourier Transform (DFT)
    Discrete Cosine Transform
    Discrete Wavelet Transform
    Random Sequence Generation 
    The Chaotic Map
    Error Correction Code
    Set Partitioning in Hierarchical Tree
    Digital Watermarking Fundamentals
    Spatial-Domain Watermarking
    Frequency-Domain Watermarking
    The Fragile Watermark
    The Robust Watermark
    Watermarking Attacks and Tools
    Image Processing Attacks
    Geometric Transformation 
    Cryptographic Attack
    Protocol Attacks
    Watermarking Tools
    Combinational Digital Watermarking in the Spatial
    and Frequency Domains
    An Overview of Combinational Watermarking
    Watermarking in the Spatial Domain
    Watermarking in the Frequency Domain
    Experimental Results
    Further Encryption of Combinational Watermarking
    Genetic Algorithm-Based Digital Watermarking
    Introduction to the Genetic Algorithm
    The Concept of Genetic Algorithm-Based Watermarking
    Genetic Algorithm-Based Rounding-Error Correction Watermarking
    An Application for Medical Image Watermarking
    Adjusted-Purpose Digital Watermarking
    An Overview of Adjusted-Purpose Digital Watermarking
    The Morphological Approach for Extracting Pixel-Based Features 
    The Strategies for Adjusting the Varying-Sized Transform
    Window and Quality Factor
    Experimental Results 
    The Collecting Approach for Generating the VSTW
    Robust High-Capacity Digital Watermarking
    The Weakness of Current Robust Watermarking
    The Concept of Robust Watermarking 
    Enlargement of Significant Coefficients
    The Determination of Embedding Locations
    The RHC Watermarking Algorithm
    Experimental Results 
    Introduction to Digital Steganography 
    Types of Steganography
    Applications of Steganography 
    Embedding Security and Imperceptibility
    Examples of Steganographic Software 
    Steganalysis
    An Overview
    The Statistical Properties of Images
    The Visual Steganalytic System
    IQM-Based Steganalytic System
    Learning Strategies 
    The Frequency-Domain Steganalytic System
    Genetic Algorithm-Based Steganography
    An Overview of the GA-Based Breaking Methodology
    The GA-Based Breaking Algorithm on the FDSS 
    Experimental Results 
    Complexity Analysis
    Index

    Biography

    Shih, Frank Y.