+612 9045 4394
 
CHECKOUT
Data Hiding for Information Security : Content Security in Digital Multimedia - Mahalingham Ramkumar

Data Hiding for Information Security

Content Security in Digital Multimedia

Hardcover

Published: 1st August 2004
Ships: 7 to 10 business days
7 to 10 business days
$215.50
or 4 easy payments of $53.88 with Learn more

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

" ... this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field." - Dan Bergevin of Catfield International, Security Management "This is a readable book and of importance to those with a special interest in the growing number of multimediea technologies now being applied to the internet services. Cyberneticians and systemists will find the book of interest and those who are directly involved with these online activities need to read it." - D.M. Hutton, Kybernetes, Volume 34, Issue 7+8, 2005 "With Data Hiding Fundamentals and Applications, the three authors seek to fill a broad gap in the literature of digital multimedia security. Steganography, the art of hiding information in multimedia content, is discussed in meticulous detail in various contexts. But if you don't savor complex equations and block diagrams, this book isn't for you... Because of its high level of information, this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field."--Security Management

Prefacep. xiii
Introduction
What Is Data Hiding?p. 1
Forms of Data Hidingp. 2
Relative Importance of Cover Signalsp. 3
Nature of Contentp. 4
Oblivious and Nonobliviousp. 4
Synchronous and Asynchronousp. 4
Active and Passive Wardensp. 5
Properties of Steganographic Communicationsp. 5
Multimedia Data Hidingp. 6
The Steganographic Channelp. 8
Frameworks for Data Hiding
Signal Processing Frameworkp. 14
Data Hiding from a Communications Perspectivep. 15
Relationship Between Communications and Signal Processing Frameworksp. 17
A Review of Data Hiding Methodsp. 20
Communication with Side Information and Data Hiding
Costa's Frameworkp. 27
A Framework Based on Channel Adaptive Encoding and Channel Independent Decodingp. 30
Highlights of the CAE-CID Frameworkp. 34
On the Duality of Communications and Data Hiding Frameworksp. 35
Codebook Generation for Data Hiding Methodsp. 40
Type I (Linear) Data Hiding
Linear Data Hiding in Transform Domainp. 50
Problem Statementp. 51
Capacity of Additive Noise Channelsp. 52
Modeling Channel Noisep. 58
Modeling Image Noisep. 59
Modeling Processing Noisep. 59
Visual Thresholdp. 61
Channel Capacity vs. Choice of Transformp. 63
Some Capacity Results and Discussionsp. 66
The Ideal Decompositionp. 74
Factors Influencing Choice of Transformp. 76
Type II and Type III (Nonlinear) Data Hiding Methods
Type II Embedding and Detectionp. 79
Type III Embedding and Detection Methodsp. 83
Postprocessing Typesp. 85
Vectoral Embedding and Detectionp. 86
Scalar Embedding and Detectionp. 87
Forms of Demodulationp. 87
Minimum Distance Decodingp. 88
Maximum Correlation Rulep. 90
Optimization Criteria for Embedding and Detection Parametersp. 91
Optimization of Parameters for Vectoral Embedding and Detectionp. 91
Optimization of Parameters for Scalar Embedding and Detectionp. 92
Maximizing Correlationp. 95
Minimizing Probability of Errorp. 96
Maximizing Mutual Informationp. 98
Performance Comparisonsp. 98
Advanced Implementations
Spread Transformingp. 108
Multiple Codebook Data Hidingp. 113
A Channel Model for Multiple Codebook Data Hidingp. 119
Single Codebook Data Hiding Based on the Maximum Correlation Criterionp. 125
Distribution of [rho subscript ind]p. 127
Distribution of [rho subscript dep]p. 128
Multiple Codebook Data Hiding Using the Maximum Correlation Criterionp. 130
Distribution of [rho superscript i subscript m,j]p. 132
Distribution of [rho subscript max]p. 133
Single Codebook Hiding Using the Minimum Distance Criterionp. 134
Distribution of d[subscript ind]p. 135
Distribution of d[subscript dep]p. 136
Multiple Codebook Hiding Using the Minimum Distance Criterionp. 137
Distribution of d[superscript i subscript m,j]p. 139
Distribution of d[subscript min]p. 139
Comparisonsp. 139
Implementation and Simulation Resultsp. 147
Major Design Issues
DFT-Based Signalingp. 154
Conventional Signalingp. 154
FFT-Based Signalingp. 155
Cyclic All-Pass Sequencesp. 155
Signal Constellationp. 157
Redundant Signalingp. 158
Synchronizationp. 160
Autocorrelation for Restoring the Cropped Signalp. 162
Practical Concernsp. 165
Watermark Signal Designp. 165
Cyclic Autocorrelationp. 165
Synchronizationp. 167
Resultsp. 167
Perceptual Constraintsp. 170
Attacks on Data Hiding Systemsp. 172
Removal Attacksp. 173
Blind Attacksp. 173
Estimation Attacksp. 174
Desynchronization Attacksp. 175
Geometric Attacksp. 175
Mosaic Attackp. 175
Template and Periodicity Removalp. 175
Security/Cryptographic Attacksp. 176
Protocol Attacksp. 176
Invertible Watermarksp. 176
Copy Attackp. 176
Future Direction in Attack Designp. 176
Data Hiding Applications
Design of Data Hiding Methods Robust to Lossy Compressionp. 179
Data Hiding for Secure Multimedia Deliveryp. 180
Compression and Data Hidingp. 182
Data Hiding with Known Compressionp. 183
Simultaneous Robustness to Multiple Compression Techniquesp. 185
Robustness to Unknown Compression Methodsp. 187
Utilizing the "Hole" in Compression Techniquesp. 187
The Data Hiding Schemep. 191
Type III Hiding for Lossy Compressionp. 194
Joint Embedding and Compressionp. 195
Results for JPEG Compressionp. 197
Watermarking for Ownershipp. 199
Counterfeit Attacks on Watermarksp. 201
Freedom in Choosingp. 202
Detection Statisticp. 203
Fake Originalsp. 205
Multiple Watermarksp. 205
Watermarking Algorithmsp. 206
Overcoming Attacks on Watermarksp. 207
Restrictions on Choice of Signaturep. 209
Attacking Scheme III (Craver's Protocol)p. 210
Quasi-Oblivious Watermarkingp. 211
Detection Statistic for Quasi-Oblivious Watermarkingp. 213
Suggested Protocolp. 214
An Example of a Watermarking Schemep. 216
CAE-CID Framework under Varying Channel Noisep. 221
Statistics of [rho subscript dep vertical bar]P and d[subscript dep vertical bar]Pp. 223
Mathematical Proofs
Proof of Eq. (7.7)p. 229
Proof of Eq. (7.10)p. 230
Bibliographyp. 231
Indexp. 239
Table of Contents provided by Ingram. All Rights Reserved.

ISBN: 9780120471447
ISBN-10: 0120471442
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 252
Published: 1st August 2004
Publisher: ACADEMIC PR INC
Country of Publication: US
Dimensions (cm): 23.47 x 16.1  x 2.26
Weight (kg): 0.55