+612 9045 4394
 
CHECKOUT
$7.95 Delivery per order to Australia and New Zealand
100% Australian owned
Over a hundred thousand in-stock titles ready to ship
Watermarking Systems Engineering : Enabling Digital Assets Security and Other Applications - Mauro Barni

Watermarking Systems Engineering

Enabling Digital Assets Security and Other Applications

By: Mauro Barni (Editor), Franco Bartolini (Editor)

Hardcover Published: 3rd February 2004
ISBN: 9780824748067
Number Of Pages: 500

Share This Book:

Hardcover

RRP $756.99
$523.95
31%
OFF
or 4 easy payments of $130.99 with Learn more
Ships in 10 to 15 business days

Earn 1048 Qantas Points
on this Book

The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and discusses technologies in information concealment and recovery. It highlights the requirements and challenges of applications in security, image/video indexing, hidden communications, image captioning, and transmission error recovery and concealment. It explains digital watermarking technologies, and offers an understanding of new approaches and applications, laying the groundwork for developments in the field.

Series introductionp. iii
Prefacep. v
Introductionp. 1
Elements of a watermarking systemp. 1
Information codingp. 3
Embeddingp. 3
Concealmentp. 5
Watermark impairmentsp. 6
Recovery of the hidden informationp. 6
Protocol considerationsp. 7
Capacity of watermarking techniquesp. 10
Multiple embeddingp. 11
Robustnessp. 12
Blind vs. non-blind recoveryp. 14
Private vs. public watermarkingp. 15
Readable vs. detectable watermarksp. 15
Invertibility and quasi-invertibilityp. 16
Reversibilityp. 18
Asymmetric watermarkingp. 18
Audio vs image vs video assetsp. 19
Further readingp. 20
Applicationsp. 23
IPR protectionp. 24
Demonstration of rightful ownershipp. 24
Fingerprintingp. 25
Copy controlp. 29
Authenticationp. 31
Cryptography vs watermarkingp. 31
A general authentication frameworkp. 33
Requirements of data-hiding-based authenticationp. 36
Data hiding for multimedia transmissionp. 37
Data compressionp. 37
Error recoveryp. 38
Annotation watermarksp. 40
Labelling for data retrievalp. 41
Bridging the gap between analog and digital objectsp. 41
Covert communicationsp. 42
Further readingp. 43
Information codingp. 45
Information coding in detectable watermarkingp. 47
Spread spectrum watermarkingp. 47
Orthogonal waveforms watermarkingp. 56
Orthogonal vs PN watermarkingp. 58
Self-synchronizing PN sequencesp. 62
Power spectrum shapingp. 63
Chaotic sequencesp. 65
Direct embeddingp. 68
Waveform-based readable watermarkingp. 69
Information coding through M-ary signalingp. 69
Position encodingp. 71
Binary signalingp. 72
Direct embedding readable watermarkingp. 75
Direct embedding binary signalling with bit repetitionp. 75
Channel codingp. 76
Block codesp. 77
Convolutional codesp. 79
Coding vs bit repetitionp. 81
Channel coding vs orthogonal signalingp. 83
Informed codingp. 83
Further readingp. 87
Data embeddingp. 91
Feature selectionp. 91
Watermarking in the asset domainp. 92
Watermarking in a transformed domainp. 96
Hybrid techniquesp. 102
Watermarking in the compressed domainp. 110
Miscellaneous non-conventional choices of the feature setp. 112
Blind embeddingp. 119
Additive watermarkingp. 119
Multiplicative watermarkingp. 126
Informed embeddingp. 129
Detectable watermarkingp. 135
Readable watermarkingp. 142
Further readingp. 153
Data concealmentp. 155
The Human Visual Systemp. 157
The Weber law and the contrastp. 160
The contrast sensitivity functionp. 161
The masking effectp. 167
Mapping luminance to imagesp. 170
Perception of color stimulip. 173
Perception of time-varying stimulip. 184
The Human Auditory System (HAS)p. 187
The masking effectp. 188
Concealment through feature selectionp. 190
Concealment through signal adaptationp. 192
Concealment through perceptual masksp. 192
Concealment relying on visibility thresholdsp. 198
Heuristic approaches for still imagesp. 201
A theoretically funded perceptual threshold for still imagesp. 205
MPEG-based concealment for audiop. 209
Application oriented concealmentp. 211
Video surveillance systemsp. 212
Remote sensing imagesp. 214
Further readingp. 215
Data recoveryp. 219
Watermark detectionp. 220
A hypothesis testing problemp. 221
AWGN channelp. 225
Additive / Generalized Gaussian channelp. 238
Signal dependent noise with host rejection at the embedderp. 242
Taking perceptual masking into accountp. 248
Multiplicative Gaussian channelp. 248
Multiplicative Weibull channelp. 259
Multichannel detectionp. 271
Decodingp. 272
General problem for binary signallingp. 273
Binary signaling through AWGN channelp. 275
Generalized Gaussian channelp. 279
Multiplicative watermarking with Gaussian noisep. 280
Multiplicative watermarking of Weibull-distributed featuresp. 285
Quantization Index Modulationp. 288
Decoding in the presence of channel codingp. 296
Assessment of watermark presencep. 299
Further readingp. 304
Watermark impairments and benchmarkingp. 307
Classification of attacksp. 308
Measuring obtrusiveness and attack strengthp. 310
Gaussian noise additionp. 312
Additive vs multiplicative watermarkingp. 312
Spread Spectrum vs QIM watermarkingp. 317
Conventional signal processingp. 325
The gain attackp. 326
Histogram equalizationp. 329
Filteringp. 331
Lossy codingp. 334
Quantization of the watermarked featuresp. 337
Geometric manipulationsp. 344
Asset translationp. 345
Asset zoomingp. 348
Image rotationp. 350
More complex geometric transformationsp. 353
Countermeasures against geometric manipulationsp. 354
Editingp. 362
Digital to analog and analog to digital conversionp. 364
Malicious attacksp. 365
Attack estimationp. 371
Benchmarkingp. 371
Early benchmarking systemsp. 372
StirMarkp. 374
Improving conventional systemsp. 378
A new benchmarking structurep. 381
Further readingp. 382
Security issuesp. 385
Security by obscurityp. 388
The symmetric casep. 389
The asymmetric casep. 394
Playing open cardsp. 401
Security based on protocol designp. 404
Further readingp. 406
An information theoretic perspectivep. 409
Some historical notesp. 411
The watermarking gamep. 412
The rules of the gamep. 413
Some selected resultsp. 416
Capacity under average distortion constraintsp. 420
The additive attack watermarking gamep. 421
Game definition and main resultsp. 421
Costa's writing on dirty paperp. 424
Lattice-based capacity-achieving watermarkingp. 427
Equi-energetic structured code-booksp. 432
Further readingp. 433
Bibliographyp. 435
Indexp. 457
Table of Contents provided by Rittenhouse. All Rights Reserved.

ISBN: 9780824748067
ISBN-10: 0824748069
Series: Signal Processing and Communications
Audience: Professional
Format: Hardcover
Language: English
Number Of Pages: 500
Published: 3rd February 2004
Publisher: Taylor & Francis Inc
Country of Publication: US
Dimensions (cm): 22.9 x 15.2  x 2.29
Weight (kg): 0.76
Edition Number: 1

Earn 1048 Qantas Points
on this Book