scispace - formally typeset
Open AccessBook

Digital Watermarking and Steganography

Reads0
Chats0
TLDR
This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

read more

Citations
More filters
Journal ArticleDOI

A robust intelligent audio watermarking scheme using support vector machine

TL;DR: Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques.
Book ChapterDOI

Scalability Evaluation of Blind Spread-Spectrum Image Watermarking

TL;DR: This paper develops two multi-channel watermarking schemes with blind detection, based on additive spread-spectrum watermarked: one employs the DCT domain, the other the DWT domain, and obtains watermark scalability by combining detection results from multiple channels modeled by Generalized Gaussian distributions.
Journal ArticleDOI

Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics

TL;DR: A 54-dimentional feature set exploiting spatio-temporal features of motion vectors to blindly detect MV-based stego videos and results have shown that the features’ performance far exceeds that of state-of-the-art steganalysis methods.
Book ChapterDOI

M-Identity and its authentication protocol for secure mobile commerce applications

TL;DR: A concept of m-identity targeted at control the access of involved parties in an m-commerce transaction is proposed, which merges mobile device identity into biometrics images and a watermark is embedded in the captured biometric images.
Journal ArticleDOI

A robust digital audio watermarking using higher-order statistics

TL;DR: Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signal processing such as MP3 compression, noise addition, resampling, re-quantization, etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, jittering, etc.
References
More filters
Book

The Nature of Statistical Learning Theory

TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings Article

An iterative image registration technique with an application to stereo vision

TL;DR: In this paper, the spatial intensity gradient of the images is used to find a good match using a type of Newton-Raphson iteration, which can be generalized to handle rotation, scaling and shearing.
Book

Signal detection theory and psychophysics

TL;DR: This book discusses statistical decision theory and sensory processes in signal detection theory and psychophysics and describes how these processes affect decision-making.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Related Papers (5)