Informed Watermarking

Overview

Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication.
Read More Show Less
... See more details below
Hardcover (2002)
$138.93
BN.com price
(Save 17%)$169.00 List Price
Other sellers (Hardcover)
  • All (8) from $4.00   
  • New (1) from $157.36   
  • Used (7) from $4.0   
Sending request ...

Overview

Informed Watermarking is an essential tool for both academic and professional researchers working in the areas of multimedia security, information embedding, and communication. Theory and practice are linked, particularly in the area of multi-user communication.
Read More Show Less

Editorial Reviews

From The Critics
Eggers (University of Erlangen) and Girod (Stanford University) overview several approaches to digital watermarking, and develop a suboptimal practical communication scheme based on Costa's scheme, called the scalar Costa scheme. The approach involves embedding information into independent identically distributed data and attacks by additive white Gaussian noise. The performance limits of digital watermarking facing liner filtering and additive noise attacks are investigated. The final chapter applies the concepts to the digital watermarking of 3D atomic coordinates in chemical structures and digital images. Annotation c. Book News, Inc., Portland, OR
Read More Show Less

Product Details

Table of Contents

Abbreviations and Acronyms
Notation
Preface
Acknowledgments
1 Introduction 1
2 General Concepts and State-of-the-Art 7
2.1 A General Model of Digital Watermarking 7
2.2 Restrictions and Simplifications 10
2.3 Stochastic Modeling of Digital Watermarking 13
2.4 Performance Evaluation of Digital Watermarking 16
2.5 Spread-Spectrum Watermarking 20
2.6 Exploiting Side Information at the Encoder 23
2.7 A Game-Theoretic Approach to Digital Watermarking 29
3 Information Embedding Into IID Signals Facing an AWGN Attack 33
3.1 Scalar Costa Scheme 33
3.2 Theoretical Performance Analysis 37
3.3 High-Rate SCS Communication 45
3.4 Low-Rate SCS Communication 48
3.5 Inverse SCS 54
3.6 Detection of Information Embedded with SCS 62
3.7 Chapter Summary 64
4 Digital Watermarking: A Game Between Embedder and Attacker 67
4.1 Watermarking of IID Signals 67
4.2 Watermarking of Non-IID Signals 78
4.3 Step Size and Offset Estimation for SCS 89
4.4 Chapter Summary 100
5 Applications 103
5.1 Watermarking of Chemical Structure Sets 103
5.2 Watermarking of digital images 112
5.3 Chapter Summary 134
6 Summary, Conclusions, and Outlook 137
6.1 Communication Exploiting Side Information 137
6.2 The Game Between Watermark Embedder and Attacker 139
6.3 Applications for Digital Watermarking 141
6.4 Future Research Topics 142
App. A Properties of SCS Transmission 143
App. B Solution of the Watermarking Game for Sawn Attacks 151
App. C Optimization of Attack Strategy for Fixed Embedding Strategy 153
App. D Optimization of the Embedding Strategy 159
App. E Test Images and Additional Results 165
References 169
Index 179
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)