scispace - formally typeset
Open AccessBook

Digital Watermarking and Steganography

Reads0
Chats0
TLDR
This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

read more

Citations
More filters
Book

Steganography in Digital Media: Principles, Algorithms, and Applications

TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Journal ArticleDOI

Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection

TL;DR: The PEE technique is further investigated and an efficient reversible watermarking scheme is proposed, by incorporating in PEE two new strategies, namely, adaptive embedding and pixel selection, which outperforms conventional PEE.
Journal ArticleDOI

Reversible Data Hiding: Advances in the Past Two Decades

TL;DR: In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RD h into image compressed domain (e.g., JPEG); 3) RDh suitable for image semi-fragile authentication; 4)RDH with image contrast enhancement; 5) RD H into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDD into video and into audio.
Proceedings ArticleDOI

Protecting Intellectual Property of Deep Neural Networks with Watermarking

TL;DR: By extending the intrinsic generalization and memorization capabilities of deep neural networks, the models to learn specially crafted watermarks at training and activate with pre-specified predictions when observing the watermark patterns at inference, this paper generalizes the "digital watermarking'' concept from multimedia ownership verification to deep neural network (DNN) models.
Proceedings ArticleDOI

Embedding Watermarks into Deep Neural Networks

TL;DR: This work proposes to use digital watermarking technology to protect intellectual property and detect intellectual property infringement in the use of trained models, and proposes a general framework for embedding a watermark in model parameters, using a parameter regularizer.
References
More filters
Journal ArticleDOI

The codebreakers : the story of secret writing

TL;DR: In this article, the PAGENT OF CRYPT has been revised with the title "New Cryptology goes public" with the purpose of making it available to the general public.
Proceedings ArticleDOI

Detection of image alterations using semifragile watermarks

TL;DR: In this article, a semi-fragile watermark for still images is proposed that can detect information altering transformations even after the watermarked content is subjected to information preserving alterations.
Proceedings ArticleDOI

Compression tolerant image authentication

TL;DR: A scheme for authenticating the visual content of digital images is proposed, robust to compression noise, but will detect deliberate manipulation of the image-data.
PatentDOI

Rotation, scale, and translation resilient public watermarking for images

TL;DR: In this article, a method for detecting a watermark signal in digital image data is presented, which includes the steps of computing a logpolar Fourier transform of the image data to obtain a log-polar-fourier spectrum; projecting the logp polar Fourier spectrum down to a lower dimensional space to obtain an extracted signal; comparing the extracted signal to a target watermark signals; and declaring the presence or absence of the target watermarks signal in image data based on the comparison.
Book ChapterDOI

Improved detection of LSB steganography in grayscale images

TL;DR: In this paper, the authors consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography.
Related Papers (5)