Open AccessBook
Digital Watermarking and Steganography
Reads0
Chats0
TLDR
This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.Abstract:
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applicationsread more
Citations
More filters
Journal ArticleDOI
Digital watermarking using Hall property image decomposition method
TL;DR: A digital image watermarking algorithm using the Hall property, which is highly reliable and computationally efficient compared with state-of-the-art methods that are based on singular value decomposition.
Journal ArticleDOI
Robust image watermarking scheme using bit-plane of hadamard coefficients
Elham Etemad,Shadrokh Samavi,Shadrokh Samavi,S. M. Reza Soroushmehr,Nader Karimi,Mohammad Etemad,Shahram Shirani,Kayvan Najarian +7 more
TL;DR: The experimental results show that the proposed watermarking method, while providing transparency, is robust against many image processing attacks such as compression, image cropping and Gaussian filtering.
Book ChapterDOI
Watermarking in Biomedical Signal Processing
Nilanjan Dey,Amira S. Ashour,Sayan Chakraborty,Sukanya Banerjee,Evgeniya Gospodinova,Mitko Gospodinov,Aboul Ella Hassanien +6 more
TL;DR: This work provides an extensive view about the existing research works in the field of watermarking techniques on different biomedical signals, including the design and evaluation parameters serving as a guideline in the water marking schemes′ development and benchmarking and the comparative study between differentWatermarking methods.
Journal ArticleDOI
Adaptive reversible data hiding based on block median preservation and modification of prediction errors
TL;DR: Two enhanced reversible data hiding methods are proposed; both of them are based on two novel reversibleData hiding techniques, and one utilizes a new approach by considering the nature of different images to classify the smoothness for each piece of image blocking regions such that more secret data can be hidden into the smooth regions rather than the non-smooth ones resulting in a better embedding capability.
References
More filters
Book
The Nature of Statistical Learning Theory
TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Proceedings Article
An iterative image registration technique with an application to stereo vision
Bruce D. Lucas,Takeo Kanade +1 more
TL;DR: In this paper, the spatial intensity gradient of the images is used to find a good match using a type of Newton-Raphson iteration, which can be generalized to handle rotation, scaling and shearing.
Book
Signal detection theory and psychophysics
David M. Green,John A. Swets +1 more
TL;DR: This book discusses statistical decision theory and sensory processes in signal detection theory and psychophysics and describes how these processes affect decision-making.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.