scispace - formally typeset
Open AccessBook

Digital Watermarking and Steganography

Reads0
Chats0
TLDR
This new edition now contains essential information on steganalysis and steganography, and digital watermark embedding is given a complete update with new processes and applications.
Abstract
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession. *This new edition now contains essential information on steganalysis and steganography *New concepts and new applications including QIM introduced *Digital watermark embedding is given a complete update with new processes and applications

read more

Citations
More filters
Book

Steganography in Digital Media: Principles, Algorithms, and Applications

TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Journal ArticleDOI

Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection

TL;DR: The PEE technique is further investigated and an efficient reversible watermarking scheme is proposed, by incorporating in PEE two new strategies, namely, adaptive embedding and pixel selection, which outperforms conventional PEE.
Journal ArticleDOI

Reversible Data Hiding: Advances in the Past Two Decades

TL;DR: In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RD h into image compressed domain (e.g., JPEG); 3) RDh suitable for image semi-fragile authentication; 4)RDH with image contrast enhancement; 5) RD H into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDD into video and into audio.
Proceedings ArticleDOI

Protecting Intellectual Property of Deep Neural Networks with Watermarking

TL;DR: By extending the intrinsic generalization and memorization capabilities of deep neural networks, the models to learn specially crafted watermarks at training and activate with pre-specified predictions when observing the watermark patterns at inference, this paper generalizes the "digital watermarking'' concept from multimedia ownership verification to deep neural network (DNN) models.
Proceedings ArticleDOI

Embedding Watermarks into Deep Neural Networks

TL;DR: This work proposes to use digital watermarking technology to protect intellectual property and detect intellectual property infringement in the use of trained models, and proposes a general framework for embedding a watermark in model parameters, using a parameter regularizer.
References
More filters
Proceedings ArticleDOI

Application of QIM with dead zone for histogram preserving JPEG steganography

TL;DR: Two histogram preserving JPEG steganographic methods aiming at secure JPEG Steganography against histogram-based attacks show high performance with regard to embedding rate, PSNR of stego image, and particularly histogram preservation.
Proceedings ArticleDOI

Optimum watermark detection in color images

TL;DR: This work concentrates on the problem of watermarking embedding and optimum detection in color images through the use of spread spectrum techniques both in space and frequency, andceptive information is considered in both color systems.
Book ChapterDOI

MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video

TL;DR: This paper proposes to modify the MPEG encoding procedure to choose the so-called Picture Type of video-frames not from a regular sequence but according to a message one would like to transmit, and discusses this relationship by contrasting PTY-marks with pixelwatermarking.
Proceedings ArticleDOI

Multi-bit image watermarking robust to geometric distortions

TL;DR: A novel method for multi-bit image watermarking robust to geometric distortions is proposed and simulation results indicate the ability of the proposed method to deal with the aforementioned attacks.
Proceedings ArticleDOI

Rational dither modulation watermarking using a perceptual model

TL;DR: Experimental results demonstrate that the new algorithm outperforms the previous algorithms over the entire range of valumetric scale factors, albeit at the expense of a small decrease in fidelity.
Related Papers (5)