scispace - formally typeset
Open AccessBook

Digital Watermarking and Steganography

Reads0
Chats0
TLDR
This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

read more

Citations
More filters
Book

Steganography in Digital Media: Principles, Algorithms, and Applications

TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Journal ArticleDOI

Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection

TL;DR: The PEE technique is further investigated and an efficient reversible watermarking scheme is proposed, by incorporating in PEE two new strategies, namely, adaptive embedding and pixel selection, which outperforms conventional PEE.
Journal ArticleDOI

Reversible Data Hiding: Advances in the Past Two Decades

TL;DR: In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RD h into image compressed domain (e.g., JPEG); 3) RDh suitable for image semi-fragile authentication; 4)RDH with image contrast enhancement; 5) RD H into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDD into video and into audio.
Proceedings ArticleDOI

Protecting Intellectual Property of Deep Neural Networks with Watermarking

TL;DR: By extending the intrinsic generalization and memorization capabilities of deep neural networks, the models to learn specially crafted watermarks at training and activate with pre-specified predictions when observing the watermark patterns at inference, this paper generalizes the "digital watermarking'' concept from multimedia ownership verification to deep neural network (DNN) models.
Proceedings ArticleDOI

Embedding Watermarks into Deep Neural Networks

TL;DR: This work proposes to use digital watermarking technology to protect intellectual property and detect intellectual property infringement in the use of trained models, and proposes a general framework for embedding a watermark in model parameters, using a parameter regularizer.
References
More filters
Proceedings ArticleDOI

Luminance-model-based DCT quantization for color image compression

TL;DR: A model is developed to approximate visibility thresholds for discrete cosine transform (DCT) coefficient quantization error based on the peak-to-peak luminance of the error image.
Book ChapterDOI

Detection of LSB Steganography via Sample Pair Analysis

TL;DR: A new, principled approach to detecting LSB steganography in digital signals such as images and audio is introduced and it is shown that the length of hidden message embedded in the least significant bits of signal samples can be estimated with relatively high precision.
Proceedings ArticleDOI

Towards second generation watermarking schemes

TL;DR: This paper proposes a scheme based on point features in images using a scale interaction technique based on 2D continuous wavelets and introduces the concept of second generation watermarking schemes which employ the notion of data features.
Book ChapterDOI

Feature Extraction and a Database Strategy for Video Fingerprinting

TL;DR: In this paper, the concept of video fingerprinting is presented as a tool for persistent video identification, and a technique for extracting essential perceptual features from moving image sequences and for identifying any sufficiently long unknown video segment by efficiently matching the fingerprint of the short segment with a large database of pre-computed fingerprints.
Related Papers (5)