Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications [1 ed.] 0824748069, 9780824748067

The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulat

256 66 388KB

English Pages 485 Year 2004

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Team DDU......Page 1
Series introduction......Page 6
Preface......Page 8
Contents......Page 14
1.1 Elements of a watermarking system......Page 20
1.1.2 Embedding......Page 22
1.1.3 Concealment......Page 24
1.1.5 Recovery of the hidden information......Page 25
1.2 Protocol considerations......Page 26
1.2.1 Capacity of watermarking techniques......Page 29
1.2.2 Multiple embedding......Page 30
1.2.3 Robustness......Page 31
1.2.4 Blind vs. non-blind recovery......Page 33
1.2.6 Readable vs. detectable watermarks......Page 34
1.2.7 Invertibility and quasi-invertibility......Page 35
1.2.9 Asymmetric watermarking......Page 37
1.3 Audio vs image vs video assets......Page 38
1.4 Further reading......Page 39
2 Applications......Page 42
2.1.1 Demonstration of rightful ownership......Page 43
2.1.2 Fingerprinting......Page 44
2.1.3 Copy control......Page 48
2.2.1 Cryptography vs watermarking......Page 50
2.2.2 A general authentication framework......Page 52
2.2.3 Requirements of data-hiding-based authentication .......Page 55
2.3.1 Data compression......Page 56
2.3.2 Error recovery......Page 57
2.4 Annotation watermarks......Page 59
2.4.2 Bridging the gap between analog and digital objects......Page 60
2.5 Covert communications......Page 61
2.6 Further reading......Page 62
3 Information coding......Page 64
3.1.1 Spread spectrum watermarking......Page 66
3.1.2 Orthogonal waveforms watermarking......Page 75
3.1.3 Orthogonal vs PN watermarking......Page 77
3.1.4 Self-synchronizing PN sequences......Page 81
3.1.5 Power spectrum shaping......Page 82
3.1.6 Chaotic sequences......Page 84
3.1.7 Direct embedding......Page 87
3.2.1 Information coding through M-ary signaling . . . .......Page 88
3.2.2 Position encoding......Page 90
3.2.3 Binary signaling......Page 91
3.3.1 Direct embedding binary signalling with bit repetition......Page 94
3.4 Channel coding......Page 95
3.4.1 Block codes......Page 96
3.4.2 Convolutional codes......Page 98
3.4.3 Coding vs bit repetition......Page 100
3.4.5 Informed coding......Page 102
3.5 Further reading......Page 106
4.1 Feature selection......Page 110
4.1.1 Watermarking in the asset domain......Page 111
4.1.2 Watermarking in a transformed domain......Page 115
4.1.3 Hybrid techniques......Page 121
4.1.4 Watermarking in the compressed domain......Page 129
4.1.5 Miscellaneous non-conventional choices of the feature set......Page 131
4.2.1 Additive watermarking......Page 138
4.2.2 Multiplicative watermarking......Page 145
4.3 Informed embedding......Page 148
4.3.1 Detectable watermarking......Page 154
4.3.2 Readable watermarking......Page 161
4.4 Further reading......Page 172
5 Data concealment......Page 174
5.1 The Human Visual System......Page 176
5.1.1 The Weber law and the contrast......Page 179
5.1.2 The contrast sensitivity function......Page 180
5.1.3 The masking effect......Page 186
5.1.4 Mapping luminance to images......Page 189
5.1.5 Perception of color stimuli......Page 192
5.1.6 Perception of time-varying stimuli......Page 203
5.2 The Human Auditory System (HAS)......Page 206
5.2.1 The masking effect......Page 207
5.3 Concealment through feature selection......Page 209
5.4.1 Concealment through perceptual masks......Page 211
5.4.2 Concealment relying on visibility thresholds......Page 217
5.4.3 Heuristic approaches for still images......Page 220
5.4.4 A theoretically funded perceptual threshold for still images......Page 224
5.4.5 MPEG-based concealment for audio......Page 228
5.5 Application oriented concealment......Page 230
5.5.1 Video surveillance systems......Page 231
5.5.2 Remote sensing images......Page 233
5.6 Further reading......Page 234
6 Data recovery......Page 238
6.1 Watermark detection......Page 239
6.1.1 A hypothesis testing problem......Page 240
6.1.2 AWGN channel......Page 244
6.1.3 Additive / Generalized Gaussian channel......Page 257
6.1.4 Signal dependent noise with host rejection at the embedder......Page 261
6.1.6 Multiplicative Gaussian channel......Page 267
6.1.7 Multiplicative Weibull channel......Page 278
6.1.8 Multichannel detection......Page 290
6.2 Decoding......Page 291
6.2.1 General problem for binary signalling......Page 292
6.2.2 Binary signaling through AWGN channel......Page 294
6.2.3 Generalized Gaussian channel......Page 298
6.2.4 Multiplicative watermarking with Gaussian noise . .......Page 299
6.2.5 Multiplicative watermarking of Weibull-distributed features......Page 304
6.2.6 Quantization Index Modulation......Page 307
6.2.7 Decoding in the presence of channel coding......Page 315
6.2.8 Assessment of watermark presence......Page 318
6.3 Further reading......Page 323
7 Watermark impairments and benchmarking......Page 326
7.1 Classification of attacks......Page 327
7.2 Measuring obtrusiveness and attack strength......Page 329
7.3.1 Additive vs multiplicative watermarking......Page 331
7.3.2 Spread Spectrum vs QIM watermarking......Page 336
7.4 Conventional signal processing......Page 344
7.4.1 The gain attack......Page 345
7.4.2 Histogram equalization......Page 348
7.4.3 Filtering......Page 350
7.5 Lossy coding......Page 353
7.5.1 Quantization of the watermarked features......Page 356
7.6 Geometric manipulations......Page 363
7.6.1 Asset translation......Page 364
7.6.2 Asset zooming......Page 367
7.6.3 Image rotation......Page 369
7.6.4 More complex geometric transformations......Page 372
7.6.5 Countermeasures against geometric manipulations .......Page 373
7.7 Editing......Page 381
7.8 Digital to analog and analog to digital conversion......Page 383
7.9 Malicious attacks......Page 384
7.11 Benchmarking......Page 390
7.11.1 Early benchmarking systems......Page 391
7.11.2 StirMark......Page 393
7.11.3 Improving conventional systems......Page 397
7.11.4 A new benchmarking structure......Page 400
7.12 Further reading......Page 401
8 Security issues......Page 404
8.1 Security by obscurity......Page 407
8.2 The symmetric case......Page 408
8.3 The asymmetric case......Page 413
8.4 Playing open cards......Page 420
8.5 Security based on protocol design......Page 423
8.6 Further reading......Page 425
9 An information theoretic perspective......Page 428
9.1 Some historical notes......Page 430
9.2 The watermarking game......Page 431
9.2.1 The rules of the game......Page 432
9.2.2 Some selected results......Page 435
9.2.3 Capacity under average distortion constraints . . . .......Page 439
9.3.1 Game definition and main results......Page 440
9.3.2 Costa's writing on dirty paper......Page 443
9.4 Lattice-based capacity-achieving watermarking......Page 446
9.5 Equi-energetic structured code-books......Page 451
9.6 Further reading......Page 452
Bibliography......Page 454
Index......Page 476

Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications [1 ed.]
 0824748069, 9780824748067

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers