Information hiding techniques for steganography and digital watermarking:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Boston u.a.
Artech House
2000
|
Schriftenreihe: | Artech House computing library
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVIII, 220 S. Ill. |
ISBN: | 1580530354 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013120621 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 000425s2000 a||| |||| 00||| eng d | ||
020 | |a 1580530354 |9 1-58053-035-4 | ||
035 | |a (OCoLC)456803771 | ||
035 | |a (DE-599)BVBBV013120621 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-522 |a DE-523 | ||
080 | |a 003 | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Information hiding techniques for steganography and digital watermarking |c Stefan Katzenbeisser ... eds. |
264 | 1 | |a Boston u.a. |b Artech House |c 2000 | |
300 | |a XVIII, 220 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Artech House computing library | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Katzenbeisser, Stefan |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008939195&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-008939195 |
Datensatz im Suchindex
_version_ | 1804127819879415808 |
---|---|
adam_text | Titel: Information hiding techniques for steganography and digital watermarking
Autor: Katzenbeisser, Stefan
Jahr: 2000
Contents
Foreword xv
Preface xvii
1 Introduction to information hiding 1
1.1 Main subdisciplines of information hiding............... 1
1.2 A brief history of information hiding ................. 3
1.2.1 Technical steganography.................... 3
1.2.2 Linguistic steganography.................... 4
1.2.3 Copyright enforcement..................... 8
1.2.4 Wisdom from cryptography.................. 8
1.3 Some applications of information hiding ............... 9
References.................................. 11
Secret writing and steganography 15
Principles of steganography 17
2.1 Frameworks for secret communication................. IS
2.1.1 Pure steganography....................... 20
2.1.2 Secret key steganography.................... 22
2.1.3 Public key steganography ................... 23
2.2 Security of steganography systems................... 25
2.2.1 Perfect security......................... 26
2.2.2 Detecting secret messages................... 27
2.3 Information hiding in noisy data.................... 28
2.4 Adaptive versus nonadaptive algorithms ............... 30
Information hiding techniques for steganography and digital watermarking
2.4.1 Laplace filtering......................... 30
2.4.2 Using cover-models....................... 30
2.5 Active and malicious attackers..................... 31
2.5.1 Active attackers: robust steganography............ 32
2.5.2 Supraliminal channels ..................... 33
2.5.3 Malicious attackers: secure steganography.......... 35
2.6 Information hiding in written text................... 36
2.7 Examples of invisible communication................. 37
2.7.1 Subliminal channels in digital signature schemes....... 37
2.7.2 Covert channels in operating systems............. 38
2.7.3 Video communication systems................. 38
2.7.4 Data hiding in executable files................. 39
2.8 Conclusion................................ 39
References................................... 40
A survey of steganographic techniques 43
3.1 Preliminary definitions......................... 44
3.2 Substitution systems and bitplane tools................ 45
3.2.1 Least significant bit substitution................ 45
3.2.2 Pseudorandom permutations.................. 47
3.2.3 Image downgrading and covert channels ........... 49
3.2.4 Cover-regions and parity bits ................. 50
3.2.5 Palette-based images...................... 51
3.2.6 Quantization and dithering................... 52
3.2.7 Information hiding in binary images.............. 53
3.2.8 Unused or reserved space in computer systems........ 55
3.3 Transform domain techniques..................... 56
3.3.1 Steganography in the DCT domain.............. 58
3.3.2 Hiding information in digital sound: phase coding...... 61
3.3.3 Echo hiding........................... 62
3.3.4 Information hiding and data compression........... 63
3.4 Spread spectrum and information hiding............... 64
3.4.1 A spread spectrum model................... 64
3.4.2 SSIS: a case study ....................... 66
3.5 Statistical steganography........................ 67
3.6 Distortion techniques.......................... 69
3.6.1 Encoding information in formatted text............ 69
3.6.2 Distortion of digital images .................. 70
3.7 Cover generation techniques...................... 71
3.7.1 Mimic functions......................... 71
Contents
3.7.2 Automated generation of English texts
i j.
9
3.8 Conclusion................................ 75
References................................... 75
Steganalysis 79
4.1 Steganalysis introduction and terminology.............. 79
4.2 Looking for signatures: detecting hidden information........ 82
4.2.1 Palette-based images...................... 83
4.2.2 Image distortion and noise................... 84
4.3 Extracting hidden information..................... 87
4.4 Disabling hidden information ..................... 88
4.5 Discussion and conclusion....................... 91
References................................... 92
II Watermarking and copyright protection 95
5 Introduction to watermarking techniques 97
5.1 Introduction............................... 97
5.2 History and terminology........................ 98
5.2.1 History.............................. 98
5.2.2 Watermarking terminology................... 100
5.3 Basic watermarking principles..................... 101
5.4 Watermarking applications....................... 103
5.4.1 Watermarking for copyright protection............ 104
5.4.2 Fingerprinting for traitor tracking............... 104
5.4.3 Watermarking for copy protection............... 104
5.4.4 Watermarking for image authentication............ 105
5.5 Requirements and algorithmic design issues.............. 105
5.5.1 Imperceptibiiity......................... 106
5.5.2 Robustness ........................... 106
5.5.3 Watermark recovery with or without the original data .... 107
5.5.4 Watermark extraction or verification of presence for a given
watermark........................... 108
5.5.5 Watermark security and keys ................. 108
5.5.6 Resolving rightful ownership.................. 109
5.6 Evaluation and benchmarking of watermarking systems....... 109
5.6.1 Performance evaluation and representation.......... 109
5.6.2 Watermark removal software and benchmarking....... 117
5.7 Future and standardization....................... 117
i Information hiding techniques for steganography and digital watermarking
References................................... 119
A survey of current watermarking techniques 121
6.1 Introduction............................... 121
6.2 The choice of host locations in the cover: cryptographic and
psychovisual aspects .......................... 123
6.2.1 The Patchwork algorithm ................... 123
6.2.2 Public key cryptography and public watermark recovery . . 124
6.2.3 Predictive coding for psychovisual watermark management . 125
6.3 The choice of a workspace....................... 125
6.3.1 Discrete Fourier transform................... 125
6.3.2 Discrete cosine transform.................... 126
6.3.3 Mellin-Fourier transform.................... 127
6.3.4 Wavelet domain......................... 128
6.3.5 Split image in perceptual bands................ 131
6.4 Formatting the watermark bits .................... 132
6.4.1 Spread spectrum........................ 132
6.4.2 Low frequency watermark design ............... 135
6.4.3 Error-correcting codes..................... 135
6.5 Merging the watermark and the cover................. 136
6.5.1 Phase modulation........................ 137
6.5.2 Amplitude modulation..................... 137
6.5.3 Merging that preserves the luminance average........ 138
6.5.4 Merging based on DCT coefficient quantization....... 139
6.5.5 Merging based on block substitution in fractal coding .... 140
6.6 Optimization of the watermark receiver................ 142
6.6.1 Image prefiltering........................ 142
6.6.2 Phase-correlation maxima for reorientation and resizing . . . 143
6.6.3 Adaptive threshold improving decision robustness...... 144
6.7 Extensions from still images to video................. 144
6.7.1 Motion vector quantization................... 144
6.8 Concluding remarks........................... 145
References................................... 145
Robustness of copyright marking systems 149
7.1 Robustness requirements........................ 149
7.2 Signal diminishment .......................... 151
7.2.1 Noise and overmarking..................... 151
7.2.2 Compression........................... 152
7.2.3 User quality standards..................... 152
___________________________________________________________________________________________Cimfi fii.s j.y
7.2.4 Averaging............................ 153
7.2.5 Specifically designed attacks.................. 15-1
7.3 Watermark detector failure....................... 155
7.3.1 Distortion attacks........................ 155
7.3.2 Bitrate limitation........................ 156
7.3.3 Unanticipated collisions and false alarms........... 158
7.4 Counterfeiting marks.......................... 160
7.4.1 Protocol attack......................... 160
7.4.2 Oracle attack.......................... 163
7.4.3 Custom-tailored oracle attack................. 164
7.5 Detection of the watermark ...................... 164
7.5.1 An attack on ;echo hiding .................. 165
7.5.2 The twin peaks attack.................... 1C5
7.6 System architecture issues....................... 166
7.6.1 Human factors ......................... 167
7.6.2 User interface.......................... 167
7.6.3 Implementation weaknesses .................. 168
7.6.4 Automated spider limitations................. 169
7.7 Court of law attacks.......................... 170
7.7.1 Foreign server.......................... 170
7.7.2 Spoofing attack......................... 170
7.8 Conclusion................................ 171
References................................... 172
Fingerprinting 175
8.1 Introduction............................... 175
8.2 Examples of fingerprinting....................... 176
8.3 Terminology and requirements.................... 177
5.4 Classification............................. I7s
8.4.1 Object-based classification................. 178
8.4.2 Detection-sensitivity-based classification......... 179
8.4.3 Fingerprinting method-based classification......... 179
8.4.4 Fingerprint-based classification ............... 179
8.5 Research history ................... ....... ISO
8.6 Fingerprinting schemes......................... 181
8.6.1 Statistical fingerprinting.................... 181
8.6.2 Collusion-secure fingerprinting................. 182
8.6.3 Asymmetric fingerprinting.................. 184
8.6.4 Traitor tracing ......................... 186
8.6.5 Anonymous fingerprinting................... 187
x Information hiding techniques for steganography and digital watermarking
8.7 Conclusion................................ 188
References................................... 189
9 Copyright on the Internet and watermarking 191
9.1 Digital copyright and watermarking.................. 191
9.1.1 The WIPO treaties and WIPO s digital agenda....... 192
9.1.2 Technical protection systems, rights management information,
and their circumvention .................... 193
9.1.3 Legal protection of watermarking systems .......... 195
9.1.4 Watermarking interoperability................. 196
9.1.5 Broader considerations of reader privacy........... 197
9.1.6 Conclusion............................ 199
9.2 Conflict of copyright laws on the Internet............... 199
9.2.1 The new rules on conflict of laws in torts in the U.K..... 200
9.2.2 Information technology and intellectual property aspects . . 203
9.2.3 Conclusions........................... 208
References................................... 208
Index 215
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV013120621 |
classification_rvk | SK 170 ST 276 |
ctrlnum | (OCoLC)456803771 (DE-599)BVBBV013120621 |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01620nam a2200421 c 4500</leader><controlfield tag="001">BV013120621</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">000425s2000 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1580530354</subfield><subfield code="9">1-58053-035-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)456803771</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013120621</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-523</subfield></datafield><datafield tag="080" ind1=" " ind2=" "><subfield code="a">003</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information hiding techniques for steganography and digital watermarking</subfield><subfield code="c">Stefan Katzenbeisser ... eds.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston u.a.</subfield><subfield code="b">Artech House</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 220 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House computing library</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Katzenbeisser, Stefan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008939195&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008939195</subfield></datafield></record></collection> |
id | DE-604.BV013120621 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:39:25Z |
institution | BVB |
isbn | 1580530354 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008939195 |
oclc_num | 456803771 |
open_access_boolean | |
owner | DE-92 DE-522 DE-523 |
owner_facet | DE-92 DE-522 DE-523 |
physical | XVIII, 220 S. Ill. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Artech House |
record_format | marc |
series2 | Artech House computing library |
spelling | Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser ... eds. Boston u.a. Artech House 2000 XVIII, 220 S. Ill. txt rdacontent n rdamedia nc rdacarrier Artech House computing library Kryptologie (DE-588)4033329-2 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Steganographie (DE-588)4617648-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Steganographie (DE-588)4617648-2 s Elektronisches Wasserzeichen (DE-588)4572344-8 s Katzenbeisser, Stefan Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008939195&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Information hiding techniques for steganography and digital watermarking Kryptologie (DE-588)4033329-2 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Steganographie (DE-588)4617648-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4572344-8 (DE-588)4617648-2 |
title | Information hiding techniques for steganography and digital watermarking |
title_auth | Information hiding techniques for steganography and digital watermarking |
title_exact_search | Information hiding techniques for steganography and digital watermarking |
title_full | Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser ... eds. |
title_fullStr | Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser ... eds. |
title_full_unstemmed | Information hiding techniques for steganography and digital watermarking Stefan Katzenbeisser ... eds. |
title_short | Information hiding techniques for steganography and digital watermarking |
title_sort | information hiding techniques for steganography and digital watermarking |
topic | Kryptologie (DE-588)4033329-2 gnd Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Steganographie (DE-588)4617648-2 gnd |
topic_facet | Kryptologie Elektronisches Wasserzeichen Steganographie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008939195&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT katzenbeisserstefan informationhidingtechniquesforsteganographyanddigitalwatermarking |