Digital Watermarking Techniques and Trends 1st edition by Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales – Ebook PDF Instant Download/DeliveryISBN: 9811020957, 9789811020957
Full download Digital Watermarking Techniques and Trends 1st edition after payment.
Product details:
ISBN-10 : 9811020957
ISBN-13 : 9789811020957
Author: Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field. Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.
Digital Watermarking Techniques and Trends 1st Table of contents:
1 Preliminary on Watermarking Technology
1.1 Overview
1.2 Fundamentals of Digital Watermarking
1.3 Requirements of Digital Watermarking
1.3.1 Robustness of Digital Watermarking
1.3.2 Capacity of Digital Watermarking
1.3.3 Imperceptibility of Digital Watermarking
1.3.3.1 Objective Measurement
1.3.3.2 Subjective Measurement
1.3.3.3 Intelligibility Measurement
1.3.4 Tamper Resistance
1.3.5 Computational Cost
1.3.6 False Positive Rate
1.3.7 False Negative Rate
1.4 Zero Watermarking
1.5 Applications of Digital Watermarking
1.6 Book Structure
References
Part I Signal Watermarking
2 Audio Watermarking
2.1 Introduction
2.2 Transmission Channel
2.3 Audio Watermarking Techniques
2.3.1 Temporal Domain
2.3.1.1 Low-Bit Encoding
2.3.1.2 Echo Hiding
2.3.1.3 Hiding in Silence Intervals
2.3.2 Frequency Domain
2.3.2.1 Spread Spectrum
2.3.2.2 Discrete Wavelet Transform
2.3.2.3 Tone Insertion
2.3.2.4 Phase Coding
2.3.2.5 Amplitude Coding
2.3.2.6 Cepstral Domain
2.3.3 Coded Domain
2.3.3.1 In-Encoder Techniques
2.3.3.2 Post-encoder Techniques
2.4 Embedding Approach
2.4.1 Embedding Before Encoding (Pre-encoding)
2.4.2 Embedding During Encoding (in-Encoder)
2.4.3 Embedding After Encoding (Post-encoder)
2.5 Audio Attacks
2.5.1 Dynamics
2.5.1.1 Compressor
2.5.1.2 Denoiser
2.5.2 Filter
2.5.3 Ambience
2.5.4 Conversion
2.5.5 Loss Compression
2.5.6 Noise
2.5.7 Modulation
2.5.8 Time Stretch and Pitch Shift
2.5.9 Sample Permutations
2.6 Comparison Among Different Audio Watermarking Methods
References
3 Speech Watermarking
3.1 Introduction
3.2 Speech Versus Audio
3.3 Linear Predictive Analysis (LPA)
3.4 Speech Watermarking Techniques
3.4.1 Speech Watermarking Based on Auditory Masking
3.4.1.1 Frequency Masking
3.4.1.2 Temporal Masking
3.4.2 Speech Watermarking Based on Phase Modulation
3.4.2.1 Autoregressive (AR) Phase Model
3.4.2.2 DFT Phase Model
3.4.2.3 Lapped Orthogonal Transforms
3.4.3 Speech Watermarking Based on Quantization
3.4.3.1 QIM
3.4.3.2 RDM
3.4.4 Speech Watermarking Based on Transformation
3.4.4.1 Spread Spectrum
3.4.4.2 Bitstream Domain
3.4.5 Speech Watermarking Based on Parametric Modeling
3.5 Attacks for Speech Watermarking
3.5.1 Additive White Gaussian Noise (AWGN)
3.5.2 Low-Pass Filter (LPF)
3.5.3 Band-Pass Filter (BPF)
3.5.4 A-Law
3.5.5 µ-Law
3.5.6 CELP
3.5.7 Amplitude Variation
3.5.8 Resample
3.5.9 Requantization
3.6 Challenges in Speech Watermarking
References
Part II Multimedia Watermarking
4 Image Watermarking
4.1 Introduction
4.2 Background
4.3 Image Watermarking Techniques
4.3.1 Spatial Domain
4.3.2 Transform Domain
4.3.3 Multiple Domains
4.4 Image Attacks
4.5 Challenges in Image Watermarking
4.6 Image Watermarking Based on Human Visual System
4.7 Medical Image Watermarking
References
5 Video Watermarking
5.1 Introduction
5.2 Background of Video
5.3 Video Watermarking Techniques
5.3.1 Image-Based Video Watermarking
5.3.1.1 Transform Domain
5.3.1.2 Temporal Dimension Video Watermarking
5.3.2 Video-Based Video Watermarking
5.3.2.1 Video Watermarking Based on Compression Format
5.3.2.2 Video Watermarking Based on Motion Information
5.4 Video Watermarking Attacks
5.4.1 Temporal Frame Averaging (TFA)
5.4.2 Watermark Estimation Remodulation (WER)
5.4.3 Watermark Estimations Clustering and Remodulation (WECR)
5.4.4 Watermarking Subspace Estimation Draining (WSED)
5.4.5 Block Replacement (BR)
5.4.6 Block Combination
5.4.7 Block Projection
5.4.8 Block Restoration
5.4.9 Block Swapping
5.5 Video-Enforced Strategies
5.5.1 SS System
5.5.2 SS-1 System
5.5.3 SS-N System
5.5.4 SS-α System
5.5.5 Discussion
5.6 Critical Review in Video Watermarking
References
6 Three-Dimensional (3D) Watermarking
6.1 Introduction
6.2 3D Modeling Representation
6.3 Background of 3D Watermarking
6.4 Attacks in 3D Watermarking
6.5 Techniques in 3D Watermarking
6.5.1 Fragile 3D Watermarking
6.5.1.1 Geometry-Based Watermarking
6.5.1.2 Topology-Based Watermarking
6.5.1.3 Representation-Based Watermarking
6.5.2 Robust 3D Watermarking
6.5.2.1 Spatial-Based Watermarking
6.5.2.2 Transform-Based Watermarking
6.6 Distortion Evaluation in 3D Watermarking
References
Part III Document Watermarking
7 Natural Language Watermarking
7.1 Introduction
7.2 Background of Natural Language Processing
7.2.1 Data Resources
7.2.2 Linguistic Transformations
7.2.3 Natural Language Parsing
7.2.4 Word Sense Disambiguation
7.2.5 Statistical Language Models
7.2.6 Natural Language Generation
7.2.7 Natural Language Paraphrasing
7.3 Natural Language Watermarking
7.3.1 Requirements of NL Watermarking
7.3.2 Natural Language Watermarking Techniques
7.3.2.1 Fragile Natural Language Watermarking Techniques
Probabilistic Context-Free Grammars
Synonym Substitutions
Translation Based
Hybrid Techniques
7.3.2.2 Robust Natural Language Watermarking Techniques
Synonym Substitution Based on Quadratic Residues
Tree Structures of Sentences
Linguistically Analyzing the Applicability of Sentence Level Transformations
7.4 NL Watermarking Versus Text Watermarking
References
8 Text Watermarking
8.1 Introduction
8.2 Background of Text Watermarking
8.3 Attacks in Text Watermarking
8.4 Text Watermarking Robustness
8.5 Text Watermarking Techniques
8.5.1 Image-Based Approach
8.5.2 Syntactic Approach
8.5.3 Semantic Approach
8.5.4 Structural Approach
8.5.5 Hybrid Approach
8.6 Discussion
8.7 Summary
References
9 Software Watermarking
9.1 Introduction
9.2 Background of Software Watermarking
9.3 Formal Representation of Software Watermarking
9.4 Software Watermarking Criteria
9.5 Software Watermarking Techniques
9.5.1 Basic Blocking Reordering Technique
9.5.2 Register Allocation Technique
9.5.3 Spread Spectrum Technique
9.5.4 Opaque Predicate Technique
9.5.5 Threading Technique
9.5.6 Abstract Interpretation Technique
9.5.7 Metamorphic Technique
9.5.8 Dynamic Path Technique
9.5.9 Mobile Agent Technique
9.5.10 Graph-Based Technique
9.5.11 Birthmarks Technique
9.6 Attacks in Software Watermarking
9.7 Discussion
References
10 Relational Database, XML, and Ontology Watermarking
10.1 Introduction
10.2 Issues in Relational Database Watermarking
10.3 Database Watermarking Attacks
10.4 Database Watermarking Techniques
10.4.1 Distortion-Based Watermarking
10.4.1.1 Watermarking Based on Numerical Data-Type Attribute
10.4.1.2 Watermarking Based on Non-numeric Multi-word Attributes
10.4.1.3 Watermarking Based on Tuple or Attribute Insertion
10.4.2 Distortion-Free Watermarking
10.4.2.1 Extracting Hash Value as Watermark Information
10.4.2.2 Combining Owner’s Mark and Database Features as Watermark Information
10.4.2.3 Converting Database Relation into Binary Form Used as Watermark Information
10.4.2.4 R-Tree-Based Permutation as Watermark
10.5 Types of Digital Watermark
10.5.1 Arbitrary Meaningless Bit Pattern
10.5.2 Image
10.5.3 Speech
10.5.4 Content Characteristics
10.5.5 Cloud Model
10.5.6 Meaningful Information
10.5.7 Fake Tuples
10.5.8 Virtual Attribute
10.6 Extension of Database Watermarking to XML Watermarking
10.7 Preliminary in XML Data
10.8 XML Watermarking
10.8.1 Query-Based XML Watermarking
10.8.2 Fuzzy Queries XML Watermarking
10.9 XML Watermarking Attacks
10.10 Extension of Database Watermarking to Ontology Watermarking
10.11 Ontology Watermarking
References
Part IV Advance in Watermarking
11 Network Stream Watermarking
11.1 Introduction
11.2 Network Traffic Modeling
11.3 Network Watermark Properties
11.4 Network Watermarking Techniques
11.4.1 Network Flow Watermarking
11.4.2 Watermarks in Anonymous Systems
11.4.3 Watermarks in Stepping Stones
11.4.4 Interval Centroid-Based Watermarking
11.4.5 Interval-Based Watermarking
11.4.6 Spread-Spectrum Watermarking
11.5 Network Watermarking Attacks
11.5.1 Active Attack
11.5.2 Copy Attack
11.5.3 Ambiguity Attacks
11.5.4 Packet Modification Attack
11.6 Watermarking Strategy
11.6.1 Single-Message Watermarks
11.6.2 Multi-message Watermarks
11.6.3 Multiple Messages
11.7 Types of Adversaries
11.7.1 Invisibility with Isolated Adversaries
11.7.1.1 Output-Only Detection Encoder
11.7.1.2 Multi-flow Attacks
11.7.2 Invisibility with Chosen Flow Adversaries
11.7.2.1 Known Flow Attack
11.7.2.2 Chosen Flow Attack
References
12 Hardware IP Watermarking
12.1 Introduction
12.2 Background of SOC Design Flow
12.3 Reusable and Deliverable IP Blocks
12.4 Hardware IP Watermarking Techniques
12.4.1 Dynamic IP Watermarking Technique
12.4.1.1 Test Sequence Watermarking
12.4.1.2 Digital Signal Processing Watermarking
12.4.1.3 Watermarking Finite State Machines
12.4.2 Static IP Watermarking Technique
12.4.3 Hierarchical IP Watermarking Technique
12.5 Attack on IP Watermarking
12.6 Criterion in IP Watermarking
12.7 Discussion
References
13 Security Enhancement of Digital Watermarking
13.1 Introduction
13.2 Digital Watermarking Application Scenarios for Online Biometric Recognition Systems
13.2.1 Stenographic (Covert) Communication
13.2.2 Multi-biometric Recognition
13.2.3 Multi-factor Authentication (MFA)
13.2.4 Sample Replay Prevention
13.2.5 Sample Authentication
13.3 Biometric Watermarking
13.4 Quantum Watermarking
13.5 DNA Watermarking
13.6 Application of Watermarking in Financial Systems
13.7 Robustness Versus Security
People also search for Digital Watermarking Techniques and Trends 1st:
a review of digital watermarking techniques for text documents
digital watermarking techniques for image security a review
information hiding techniques for steganography and digital watermarking
digital image watermarking techniques a review
digital watermarking and steganography fundamentals and techniques
Tags: Digital Watermarking, Techniques, Trends, Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales