| Preface | p. v |
| Introduction | p. 1 |
| Overview of Multimedia Data Hiding | p. 2 |
| Book Organization | p. 6 |
| Fundamental Issues and Solutions | p. 6 |
| Algorithm and System Designs | p. 7 |
| Attacks and Countermeasures | p. 10 |
| Fundamental Issues | p. 13 |
| Preliminaries | p. 15 |
| Data Hiding Framework | p. 15 |
| Key Elements and A Layered View | p. 16 |
| Basic Embedding Mechanisms | p. 19 |
| Two Basic Embedding Mechanisms | p. 21 |
| Probability of Detection Errors | p. 24 |
| Embedding Capacity | p. 27 |
| Capacity for Type-I Embedding | p. 28 |
| Capacity of Type-II Embedding | p. 28 |
| Capacity Comparison for Type-I & Type-II | p. 30 |
| Extensions and Discussions | p. 32 |
| Techniques for Embedding Multiple Bits | p. 34 |
| Modulation and Multiplexing Techniques | p. 34 |
| Comparison | p. 36 |
| Chapter Summary | p. 39 |
| Appendix - Derivations of Type-II Embedding Capacity | p. 40 |
| Handling Uneven Embedding Capacity | p. 43 |
| Quantitative Model for Uneven Embedding Capacity | p. 45 |
| Constant Embedding Rate (CER) | p. 45 |
| Backup Embedding | p. 47 |
| Equalizing Embedding Capacity Via Shuffling | p. 48 |
| Practical Considerations | p. 52 |
| Discussions | p. 53 |
| Variable Embedding Rate (VER) | p. 53 |
| Conveying Additional Side Information | p. 54 |
| Outline of Examples | p. 55 |
| Chapter Summary | p. 55 |
| Appendix - Generating Shuffling Table From A Key | p. 56 |
| Appendix - Analysis of Shuffling | p. 57 |
| Joint Probability of Histogram | p. 57 |
| Mean and Variance of Each Bin | p. 58 |
| More About <$>Eleft [ frac{m_r}{N}right] | p. 60 |
| Approximations for Hypergeometric Distribution | p. 61 |
| More About <$>Varleft [ frac{m_r}{N} right] | p. 64 |
| Algorithm and System Designs | p. 65 |
| Data Hiding in Binary Image | p. 67 |
| Proposed Scheme | p. 69 |
| Flippable Pixels | p. 69 |
| Embedding Mechanism | p. 71 |
| Uneven Embedding Capacity and Shuffling | p. 72 |
| Applications and Experimental Results | p. 76 |
| ""Signature in Signature"" | p. 76 |
| Invisible Annotation for Line Drawings | p. 76 |
| Tamper Detection for Binary Document | p. 77 |
| Robustness and Security Considerations | p. 78 |
| Analysis and Enhancement of Robustness | p. 79 |
| Security Considerations | p. 82 |
| Chapter Summary | p. 85 |
| Appendix - Details of Determining Flippability Scores | p. 86 |
| Appendix - Recovering Images After Printing & Scanning | p. 90 |
| Multilevel Data Hiding for Image and Video | p. 95 |
| Multi-level Embedding | p. 96 |
| Multi-level Image Data Hiding | p. 98 |
| Spectrum Partition | p. 99 |
| System Design | p. 102 |
| Refined Human Visual Model | p. 105 |
| Experimental Results | p. 111 |
| Multi-level Video Data Hiding | p. 111 |
| Embedding Domain | p. 111 |
| Variable vs. Constant Embedding Rate | p. 114 |
| User Data vs. Control Data | p. 116 |
| System Design and Experimental Results | p. 117 |
| Chapter Summary | p. 119 |
| Data Hiding for Image Authentication | p. 123 |
| Review of Prior Art | p. 125 |
| Framework for Authentication Watermark | p. 126 |
| Transform-domain Table Lookup Embedding | p. 127 |
| Considerations for Imperceptibility & Security | p. 129 |
| Estimating Embedded Data and Changes | p. 132 |
| Design of Embedded Data | p. 133 |
| Visually Meaningful Pattern | p. 133 |
| Content-based Features | p. 133 |
| Experimental Results | p. 135 |
| Extensions | p. 138 |
| Chapter Summary | p. 140 |
| Data Hiding for Video Communications | p. 141 |
| Transcoding by Downsizing Using Data Hiding | p. 142 |
| Overview of Proposed Approach | p. 142 |
| Embedding Subblock Motion Information | p. 143 |
| Advantages of Data Hiding | p. 144 |
| Experimental Results | p. 145 |
| Error Concealment and Data Hiding | p. 147 |
| Related Works | p. 147 |
| Proposed Techniques | p. 149 |
| Chapter Summary | p. 150 |
| Attacks and Countermeasures | p. 151 |
| Attacks on Known Data Hiding Algorithms | p. 153 |
| Block Replacement Attack on Robust Watermark | p. 154 |
| Existing Attacks on Robust Watermarks | p. 155 |
| Attack via Block Replacement | p. 155 |
| Analysis and Countermeasures | p. 157 |
| Countermeasures Against Geometric Attacks | p. 159 |
| Basic Idea of RST Resilient Watermarking | p. 161 |
| Embedding and Detection Algorithms | p. 162 |
| Implementation Issues | p. 164 |
| Experimental Results | p. 168 |
| Summary | p. 172 |
| Double Capturing Attack on Authentication Watermark | p. 175 |
| Proposed Attack | p. 175 |
| Countermeasures Against Proposed Attack | p. 176 |
| Attacks on Unknown Data Hiding Algorithms | p. 179 |
| Introduction | p. 179 |
| SDMI Attack Setup | p. 180 |
| Comments on Attack Setup | p. 181 |
| Attacks and Analysis on SDMI Robust Watermarks | p. 183 |
| General Approaches to Attacks | p. 183 |
| Attacks on Watermark-C | p. 184 |
| Attacks on Watermark A, B & F | p. 188 |
| Remarks | p. 191 |
| Attacks and Analysis on SDMI Fragile Watermarks | p. 192 |
| Conclusions and Perspectives | p. 195 |
| References | p. 197 |
| Index | p. 215 |
| Table of Contents provided by Publisher. All Rights Reserved. |