1st Edition
Digital Watermarking and Steganography Fundamentals and Techniques
By Frank Y. Shih
Copyright 2008
200 Pages
137 B/W Illustrations
by
CRC Press
200 Pages
137 B/W Illustrations
by
CRC Press
Also available as eBook on:
Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography:
- Demonstrates how to develop and implement methods to guarantee the authenticity of digital media
- Explains the categorization of digital watermarking techniques based on characteristics as well as applications
- Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system
The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security.
Introduction
Digital Watermarking
Digital Steganography
Differences between Watermarking and Steganography
A Brief History
Appendix: Selected List of Books on Watermarking and Steganography
Classification in Digital Watermarking
Classification Based on Characteristics
Classification Based on Applications
Mathematical Preliminaries
Least-Significant-Bit Substitution
Discrete Fourier Transform (DFT)
Discrete Cosine Transform
Discrete Wavelet Transform
Random Sequence Generation
The Chaotic Map
Error Correction Code
Set Partitioning in Hierarchical Tree
Digital Watermarking Fundamentals
Spatial-Domain Watermarking
Frequency-Domain Watermarking
The Fragile Watermark
The Robust Watermark
Watermarking Attacks and Tools
Image Processing Attacks
Geometric Transformation
Cryptographic Attack
Protocol Attacks
Watermarking Tools
Combinational Digital Watermarking in the Spatial
and Frequency Domains
An Overview of Combinational Watermarking
Watermarking in the Spatial Domain
Watermarking in the Frequency Domain
Experimental Results
Further Encryption of Combinational Watermarking
Genetic Algorithm-Based Digital Watermarking
Introduction to the Genetic Algorithm
The Concept of Genetic Algorithm-Based Watermarking
Genetic Algorithm-Based Rounding-Error Correction Watermarking
An Application for Medical Image Watermarking
Adjusted-Purpose Digital Watermarking
An Overview of Adjusted-Purpose Digital Watermarking
The Morphological Approach for Extracting Pixel-Based Features
The Strategies for Adjusting the Varying-Sized Transform
Window and Quality Factor
Experimental Results
The Collecting Approach for Generating the VSTW
Robust High-Capacity Digital Watermarking
The Weakness of Current Robust Watermarking
The Concept of Robust Watermarking
Enlargement of Significant Coefficients
The Determination of Embedding Locations
The RHC Watermarking Algorithm
Experimental Results
Introduction to Digital Steganography
Types of Steganography
Applications of Steganography
Embedding Security and Imperceptibility
Examples of Steganographic Software
Steganalysis
An Overview
The Statistical Properties of Images
The Visual Steganalytic System
IQM-Based Steganalytic System
Learning Strategies
The Frequency-Domain Steganalytic System
Genetic Algorithm-Based Steganography
An Overview of the GA-Based Breaking Methodology
The GA-Based Breaking Algorithm on the FDSS
Experimental Results
Complexity Analysis
Index
Digital Watermarking
Digital Steganography
Differences between Watermarking and Steganography
A Brief History
Appendix: Selected List of Books on Watermarking and Steganography
Classification in Digital Watermarking
Classification Based on Characteristics
Classification Based on Applications
Mathematical Preliminaries
Least-Significant-Bit Substitution
Discrete Fourier Transform (DFT)
Discrete Cosine Transform
Discrete Wavelet Transform
Random Sequence Generation
The Chaotic Map
Error Correction Code
Set Partitioning in Hierarchical Tree
Digital Watermarking Fundamentals
Spatial-Domain Watermarking
Frequency-Domain Watermarking
The Fragile Watermark
The Robust Watermark
Watermarking Attacks and Tools
Image Processing Attacks
Geometric Transformation
Cryptographic Attack
Protocol Attacks
Watermarking Tools
Combinational Digital Watermarking in the Spatial
and Frequency Domains
An Overview of Combinational Watermarking
Watermarking in the Spatial Domain
Watermarking in the Frequency Domain
Experimental Results
Further Encryption of Combinational Watermarking
Genetic Algorithm-Based Digital Watermarking
Introduction to the Genetic Algorithm
The Concept of Genetic Algorithm-Based Watermarking
Genetic Algorithm-Based Rounding-Error Correction Watermarking
An Application for Medical Image Watermarking
Adjusted-Purpose Digital Watermarking
An Overview of Adjusted-Purpose Digital Watermarking
The Morphological Approach for Extracting Pixel-Based Features
The Strategies for Adjusting the Varying-Sized Transform
Window and Quality Factor
Experimental Results
The Collecting Approach for Generating the VSTW
Robust High-Capacity Digital Watermarking
The Weakness of Current Robust Watermarking
The Concept of Robust Watermarking
Enlargement of Significant Coefficients
The Determination of Embedding Locations
The RHC Watermarking Algorithm
Experimental Results
Introduction to Digital Steganography
Types of Steganography
Applications of Steganography
Embedding Security and Imperceptibility
Examples of Steganographic Software
Steganalysis
An Overview
The Statistical Properties of Images
The Visual Steganalytic System
IQM-Based Steganalytic System
Learning Strategies
The Frequency-Domain Steganalytic System
Genetic Algorithm-Based Steganography
An Overview of the GA-Based Breaking Methodology
The GA-Based Breaking Algorithm on the FDSS
Experimental Results
Complexity Analysis
Index
Biography
Shih, Frank Y.