Digital Watermarking and Steganography: Fundamentals and Techniques 2nd Edition by Frank Y. Shih – Ebook PDF Instant Download/DeliveryISBN: 1498738774, 9781498738774
Full download Digital Watermarking and Steganography: Fundamentals and Techniques 2nd Edition after payment.

Product details:
ISBN-10 : 1498738774
ISBN-13 : 9781498738774
Author: Frank Y. Shih
This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.
Digital Watermarking and Steganography: Fundamentals and Techniques 2nd Table of contents:
1: Introduction
1.1 DIGITAL WATERMARKING
1.2 DIGITAL STEGANOGRAPHY
1.3 DIFFERENCES BETWEEN WATERMARKING AND STEGANOGRAPHY
1.4 A BRIEF HISTORY
References
APPENDIX: SELECTED LIST OF BOOKS ON WATERMARKING AND STEGANOGRAPHY
2: Classification in Digital Watermarking
2.1 CLASSIFICATION BASED ON CHARACTERISTICS
2.1.1 Blind versus Nonblind
2.1.2 Perceptible versus Imperceptible
2.1.3 Private versus Public
2.1.4 Robust versus Fragile
2.1.5 Spatial Domain Based versus Frequency Domain Based
2.2 CLASSIFICATION BASED ON APPLICATIONS
2.2.1 Copyright Protection
2.2.2 Data Authentication
2.2.3 Fingerprinting
2.2.4 Copy Control
2.2.5 Device Control
REFERENCES
3: Mathematical Preliminaries
3.1 LEAST-SIGNIFICANT-BIT SUBSTITUTION
3.2 DISCRETE FOURIER TRANSFORM
3.3 DISCRETE COSINE TRANSFORM
3.4 DISCRETE WAVELET TRANSFORM
3.5 RANDOM SEQUENCE GENERATION
3.6 CHAOTIC MAP
3.7 ERROR CORRECTION CODE
3.8 SET PARTITIONING IN HIERARCHICAL TREE
REFERENCES
4: Digital Watermarking Fundamentals
4.1 SPATIAL DOMAIN WATERMARKING
4.1.1 Substitutive Watermarking in the Spatial Domain
4.1.2 Additive Watermarking in the Spatial Domain
4.2 FREQUENCY DOMAIN WATERMARKING
4.2.1 Substitutive Watermarking in the Frequency Domain
4.2.2 Multiplicative Watermarking in the Frequency Domain
4.2.3 Watermarking Based on Vector Quantization
4.2.4 Rounding Error Problem
4.3 FRAGILE WATERMARKS
4.3.1 Block-Based Fragile Watermarks
4.3.2 Weakness of Block-Based Fragile Watermarks
4.3.3 Hierarchy-Based Fragile Watermarks
4.4 ROBUST WATERMARKS
4.4.1 Redundant Embedding Approach
4.4.2 Spread Spectrum
REFERENCES
5: Watermarking Attacks and Tools
5.1 IMAGE-PROCESSING ATTACKS
5.1.1 Attack by Filtering
5.1.2 Attack by Remodulation
5.1.3 Attack by JPEG Coding Distortion
5.1.4 Attack by JPEG 2000 Compression
5.2 GEOMETRIC ATTACKS
5.2.1 Attack by Image Scaling
5.2.2 Attack by Rotation
5.2.3 Attack by Image Clipping
5.2.4 Attack by Linear Transformation
5.2.5 Attack by Bending
5.2.6 Attack by Warping
5.2.7 Attack by Perspective Projection
5.2.8 Attack by Collage
5.2.9 Attack by Templates
5.3 CRYPTOGRAPHIC ATTACKS
5.4 PROTOCOL ATTACK
5.5 WATERMARKING TOOLS
5.6 AN EFFICIENT BLOCK-BASED FRAGILE WATERMARKING SYSTEM FOR TAMPER LOCALIZATION AND RECOVERY
5.6.1 Related Work
5.6.1.1 Vector Quantization Attack
5.6.1.2 Cyclic Redundancy Checksum
5.6.1.3 Comparison of Existing Methodologies
5.6.1.4 Lookup Table Generation
5.6.2 Proposed Method
5.6.2.1 Watermark Embedding
5.6.2.2 Tamper Detection
5.6.2.3 Recovery of Tampered Blocks
5.6.2.4 Extension to Color Images
5.6.3 Results and Discussions
REFERENCES
6: Combinational Domain Digital Watermarking
6.1 Overview of Combinational Watermarking
6.2 Watermarking in the Spatial Domain
6.3 Watermarking in the Frequency Domain
6.4 Experimental Results
6.5 Further Encryption of Combinational Watermarking
REFERENCES
7: Watermarking Based on Genetic Algorithms
7.1 Introduction to Genetic Algorithms
7.1.1 Chromosomes
7.1.2 Basic Operations of Genetic Algorithms
7.1.2.1 Reproduction
7.1.2.2 Crossover
7.1.2.3 Mutation
7.1.3 Fitness Function
7.2 Concept of Ga-Based Watermarking
7.3 Ga-Based Rounding Error Correction Watermarking
7.3.1 Definitions of Chromosome, Fitness Function, and GA Operations
7.3.1.1 Chromosomes
7.3.1.2 Fitness Function
7.3.1.3 Reproduction
7.3.1.4 Crossover
7.3.1.5 Mutation
7.3.2 GA-Based Rounding Error Correction Algorithm
7.3.3 Advanced Strategy for Initializing the First Population
7.4 Applications to Medical Image Watermarking
7.4.1 Overview of the Proposed Technique
7.4.1.1 Signature Image
7.4.1.1.1 Encoding Procedure
7.4.1.1.2 Decoding Procedure
7.4.1.1.3 SPIHT Compression
7.4.1.2 Textual Data
7.4.1.3 Watermarking Algorithm for Medical Images
7.4.2 Improved Scheme Based on Genetic Algorithms
7.4.3 Experimental Results
7.5 Authentication of JPEG Images Based on Genetic Algorithms
7.5.1 GA-Based Watermark-Embedding Method
7.5.1.1 Overall Watermark-Embedding Procedure
7.5.1.2 Authentication Information Generation
7.5.1.3 Adjustment by GA
7.5.1.3.1 Substitution of Chromosomes in the Original Block
7.5.1.3.2 Objective Function for Chromosome Evaluation
7.5.1.3.3 Genetic Algorithm to Adjust the Block
7.5.1.3.3.1 Fixed-Length Chromosome
7.5.1.3.3.2 Variable-Length Chromosome
7.5.2 Authentication
7.5.3 Experimental Results
REFERENCES
8: Adjusted-Purpose Watermarking
8.1 An Adjusted-Purpose Digital Watermarking Technique
8.1.1 Overview of Adjusted-Purpose Digital Watermarking
8.1.2 Morphological Approach to Extracting Pixel-Based Features
8.1.3 Strategies for Adjusting VSTWs and QFs
8.1.4 Experimental Results
8.1.5 Collecting Approach to Generating VSTWs
8.2 Adjusted-Purpose Watermarking Using Particle Swarm Optimization
8.2.1 Proposed Technique
8.2.1.1 ROI Automatic Extraction
8.2.1.2 Watermark Preprocessing
8.2.1.3 RONI Partitioning
8.2.1.4 Optimal Watermarking Scheme Using PSO
8.2.1.5 Algorithm for Embedding and Extracting
8.2.2 Experimental Results
References
9: High-Capacity Watermarking
9.1 ROBUST HIGH-CAPACITY DIGITAL WATERMARKING
9.1.1 Weakness of Current Robust Watermarking
9.1.2 Concept of Robust Watermarking
9.1.3 Enlargement of Significant Coefficients
9.1.3.1 Breaking Local Spatial Similarity
9.1.3.2 Block-Based Chaotic Map
9.1.4 Determination of Embedding Locations
9.1.4.1 Intersection-Based Pixel Collection
9.1.4.2 Reference Register and Container
9.1.5 RHC Watermarking Algorithm
9.1.5.1 Embedding Procedure
9.1.5.2 Extraction Procedure
9.1.5.3 Embedding and Extraction Strategies
9.1.6 Experimental Results
9.1.6.1 Capacity Enlargement
9.1.6.2 Robust Experiments
9.1.6.3 Performance Comparisons
9.2 HIGH-CAPACITY MULTIPLE-REGIONS-OF-INTEREST WATERMARKING FOR MEDICAL IMAGES
9.2.1 Proposed Technique
9.2.1.1 Watermark Information Preprocessing and Reconstruction
9.2.1.1.1 Signature Image
9.2.1.2 RONI Partitioning Algorithm
9.2.1.3 Algorithm for Embedding and Decoding
9.2.2 Experimental Results
REFERENCES
10: Reversible Watermarking
10.1 Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark
10.1.1 Watermarking Scheme
10.1.1.1 Embedding Algorithm
10.1.1.2 Extraction Algorithm
10.1.2 Performance Analysis
10.1.2.1 Perceptual Quality
10.1.2.2 Reversible Capability
10.1.2.3 Modification Authentication and Localization Capability
10.1.2.4 Security
10.1.2.5 Implementation and Other Ideas for Improvement
10.2 Reversible Data-Hiding Techniques Using Multiple-Scan Difference-Value Histogram Modification
10.2.1 Overview of the Multiple-Scan Histogram Modification Algorithm
10.2.2 Single-Scan Histogram Modification
10.2.3 Multiple-Scan Histogram Modification Example
10.2.4 Iterative Algorithm for Determining Embedding Level and Scan Order
10.2.5 Experimental Results
References
11: Steganography and Steganalysis
11.1 STEGANOGRAPHY
11.1.1 Types of Steganography
11.1.1.1 Technical Steganography
11.1.1.2 Linguistic Steganography
11.1.1.3 Digital Steganography
11.1.2 Applications of Steganography
11.1.2.1 Convert Communication
11.1.2.2 One-Time Pad Communication
11.1.3 Embedding Security and Imperceptibility
11.1.4 Examples of Steganographic Software
11.1.4.1 S-Tools
11.1.4.2 StegoDos
11.1.4.3 EzStego
11.1.4.4 JSteg-Jpeg
11.2 STEGANALYSIS
11.2.1 Image Statistical Properties
11.2.2 Visual Steganalytic Systems
11.2.3 IQM- Based Steganalytic Systems
11.2.4 Learning Strategy
11.2.4.1 Introduction to Support Vector Machines
11.2.4.2 Neural Networks
11.2.4.3 Principle Component Analysis
11.2.5 Frequency Domain Steganalytic System
REFERENCES
12: Steganography Based on Genetic Algorithms and Differential Evolution
12.1 Steganography Based on Genetic Algorithms
12.1.1 Overview of the GA-Based Breaking Methodology
12.1.1.1 Fitness Function
12.1.1.2 Reproduction
12.1.1.3 Crossover
12.1.1.4 Mutation
12.1.1.5 Algorithm for Recombining Chromosomes
12.1.2 GA-Based Breaking Algorithms in Spatial Domain Steganalytic Systems
12.1.2.1 Generating Stego-images in the Visual Steganalytic System
12.1.2.2 Generating Stego-images in the Image Quality Measure– Based Spatial Domain Steganalyt
12.1.3 GA-Based Breaking Algorithms in Frequency Domain Steganalytic Systems
12.1.4 Experimental Results
12.1.4.1 GA-Based Breaking Algorithm in the Visual Steganalytic System
12.1.4.2 GA-Based Breaking Algorithm in the IQM-Based Spatial Domain Steganalytic System
12.1.4.3 GA-Based Breaking Algorithm in the JPEG Frequency Domain Steganalytic System
12.1.5 Complexity Analysis
12.2 Steganography Based on Differential Evolution
12.2.1 DE Algorithm and Its Image-Based Steganography
12.2.1.1 Concept
12.2.1.2 Algorithm
12.2.1.3 Procedure of Applying Differential Evolution
12.2.2 Experimental Results
People also search for Digital Watermarking and Steganography: Fundamentals and Techniques 2nd:
digital watermarking and steganography pdf
digital watermarking and steganography fundamentals and techniques
digital watermarking and steganography book
digital watermarking and steganography morgan kaufmann
digital watermarking and steganography cox
Tags: Digital Watermarking, Steganography, Fundamentals, Techniques, Frank Shih


