Digital watermarking and steganography: fundamentals and techniques
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, Fl. [u.a.]
CRC Press
2008
|
Schlagworte: | |
Online-Zugang: | Publisher description Inhaltsverzeichnis |
Beschreibung: | 180 S. Ill., graph. Darst. |
ISBN: | 1420047574 9781420047578 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023202465 | ||
003 | DE-604 | ||
005 | 20090623 | ||
007 | t | ||
008 | 080307s2008 xxuad|| |||| 00||| eng d | ||
010 | |a 2007034224 | ||
020 | |a 1420047574 |c alk. paper |9 1-4200-4757-4 | ||
020 | |a 9781420047578 |9 978-1-4200-4757-8 | ||
035 | |a (OCoLC)493764076 | ||
035 | |a (DE-599)BVBBV023202465 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-92 |a DE-M382 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Shih, Frank Y. |e Verfasser |0 (DE-588)141751754 |4 aut | |
245 | 1 | 0 | |a Digital watermarking and steganography |b fundamentals and techniques |c Frank Y. Shih |
264 | 1 | |a Boca Raton, Fl. [u.a.] |b CRC Press |c 2008 | |
300 | |a 180 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Propriété intellectuelle |2 ram | |
650 | 7 | |a Protection de l'information (informatique) |2 ram | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté |2 ram | |
650 | 4 | |a Computer security | |
650 | 4 | |a Multimedia systems |x Security measures | |
650 | 4 | |a Intellectual property | |
650 | 0 | 7 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Steganographie |0 (DE-588)4617648-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Elektronisches Wasserzeichen |0 (DE-588)4572344-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Steganographie |0 (DE-588)4617648-2 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0745/2007034224-d.html |3 Publisher description | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016388666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016388666 |
Datensatz im Suchindex
_version_ | 1804137479783055360 |
---|---|
adam_text | DIGITAL WATERMARKING AND STEGANOGRAPHY SECOND EDITION INGEMAR J. COX
MATTHEW L. MILLER JEFFREY A. BLOOM JESSICA FRIDRICH TON KALKER * *;.**,
AMSTERDAM * BOSTON * HEIDELBERG * LONDON NEW YORK * OXFORD * PARIS * SAN
DIEGO ..*-&WAEJ»FTE. SAN FRAN CISCO * SINGAPORE * SYDNEY * TOKYO ^ ^ 1 ^
^ ELSEVIER MORGAN KAUFMANN PUBLISHERS IS AN IMPRINT OF ELSEVIER MORGAN
KAUFMANN PUBLISHERS CONTENTS PREFACE TO THE FIRST EDITION XV PREFACE TO
THE SECOND EDITION XIX EXAMPLE WATERMARKING SYSTEMS XXI CHAPTER 1
INTRODUCTION 1 1.1 INFORMATION HIDING, STEGANOGRAPHY, AND WATERMARKING 4
1.2 HISTORY OF WATERMARKING 6 1.3 HISTORY OF STEGANOGRAPHY 9 1.4
IMPORTANCE OF DIGITAL WATERMARKING 11 1.5 IMPORTANCE OF STEGANOGRAPHY 12
CHAPTER 2 APPLICATIONS AND PROPERTIES 15 2.1 APPLICATIONS OF
WATERMARKING 16 2.1.1 BROADCAST MONITORING 16 2.1.2 OWNER IDENTIFICATION
19 2.1.3 PROOF OF OWNERSHIP 21 2.1.4 TRANSACTION TRACKING 23 2.1.5
CONTENT AUTHENTICATION 25 2.1.6 COPY CONTROL 27 2.1.7 DEVICE CONTROL 31
2.1.8 LEGACY ENHANCEMENT 32 2.2 APPLICATIONS OF STEGANOGRAPHY 34 2.2.1
STEGANOGRAPHY FOR DISSIDENTS 34 2.2.2 STEGANOGRAPHY FOR CRIMINALS 35 2.3
PROPERTIES OF WATERMARKING SYSTEMS 36 2.3.1 EMBEDDING EFFECTIVENESS 37
2.3.2 FIDELITY 37 2.3.3 DATAPAYLOAD 38 2.3.4 BLIND OR INFORMED DETECTION
39 2.3.5 FALSE POSITIVE RATE 39 2.3.6 ROBUSTNESS 40 2.3.7 SECURITY 41
2.3.8 CIPHER AND WATERMARK KEYS 43 2.3.9 MODIFICATION AND MULTIPLE
WATERMARKS 45 2.3.10 COST 46 2.4 EVALUATING WATERMARKING SYSTEMS 46
2.4.1 THE NOTION OF BEST 47 2.4.2 BENCHMARKING 47 2.4.3 SCOPE OF
TESTING 48 VUE VIII I CONTENTS 2.5 PROPERTIES OF STEGANOGRAPHIC AND
STEGANALYSIS SYSTEMS 49 2.5.1 EMBEDDING EFFECTIVENESS 49 2.5.2 FIDELITY
50 2.5.3 STEGANOGRAPHIC CAPACITY EMBEDDING CAPACITY EMBEDDING EFFICIENCY
AND DATA PAYLOAD 50 2.5.4 BLIND OR INFORMED EXTRACTION 51 2.5.5 BLIND OR
TARGETED STEGANALYSIS 51 2.5.6 STATISTICAL UNDETECTABILITY 52 2.5.7
FALSE ALARM RATE 53 2.5.8 ROBUSTNESS 53 2.5.9 SECURITY 54 2.5.10 STEGO
KEY 54 2.6 EVALUATING AND TESTING STEGANOGRAPHIC SYSTEMS 55 2.7 SUMMARY
56 CHAPTER3 MODELS OF WATERMARKING 6I 3.1 NOTATION 62 3.2 COMMUNICATIONS
63 3.2.1 COMPONENTS OF COMMUNICATIONS SYSTEMS 63 3.2.2 CLASSES OF
TRANSMISSION CHANNELS 64 3.2.3 SECURE TRANSMISSION 65 3.3
COMMUNICATION-BASED MODELS OF WATERMARKING 67 3.3.1 BASIC MODEL 67 3.3.2
WATERMARKING AS COMMUNICATIONS WITH SIDE INFORMATION AT THE TRANSMITTER
75 3-3-3 WATERMARKING AS MULTIPLEXED COMMUNICATIONS 78 3-4 GEOMETRIE
MODELS OF WATERMARKING 80 3-4.1 DISTRIBUTIONS AND REGIONS IN MEDIA SPACE
81 3-4.2 MARKING SPACES 87 3.5 MODELING WATERMARK DETECTION BY
CORRELATION 95 3-5.1 LINEAR CORRELATION 96 3-5-2 NORMALIZED CORRELATION
97 3-5.3 CORRELATION COEFFICIENT 100 3.6 SUMMARY 102 CHAPTER 4 BASIC
MESSAGE CODING 105 4.1 MAPPING MESSAGES INTO MESSAGE VECTORS 106 4.1.1
DIRECT MESSAGE CODING 106 4.1.2 MULTISYMBOL MESSAGE CODING 110 4.2 ERROR
CORRECTION CODING 117 4.2.1 THE PROBLEM WITH SIMPLE MULTISYMBOL MESSAGES
117 4.2.2 THE IDEA OF ERROR CORRECTION CODES 118 4.2.3 EXAMPLE: TRELLIS
CODES AND VITERBI DECODING 119 CONTENTS I IX 4.3 DETECTING MULTISYMBOL
WATERMARKS 124 4.3.1 DETECTION BY LOOKING FOR VALID MESSAGES 125 4.3.2
DETECTION BY DETECTING INDIVIDUAL SYMBOLS 126 4.3.3 DETECTION BY
COMPARING AGAINST QUANTIZED VECTORS . . . 128 4.4 SUMMARY 134 CHAPTER 5
WATERMARKING WITH SIDE INFORMATION 137 5.1 INFORMED EMBEDDING 139 5.1.1
EMBEDDING AS AN OPTIMIZATION PROBLEM 140 5.1.2 OPTIMIZING WITH RESPECT
TO A DETECTION STATISTIC 141 5.1.3 OPTIMIZING WITH RESPECT TO AN
ESTIMATE OF ROBUSTNESS 147 5.2 WATERMARKING USING SIDE INFORMATION 153
5.2.1 FORMAL DEFINITION OF THE PROBLEM 153 5.2.2 SIGNAL AND CHANNEL
MODELS 155 5.2.3 OPTIMAL WATERMARKING FOR A SINGLE COVER WORK 156 5.2.4
OPTIMAL CODING FOR MULTIPLE COVER WORKS 157 5.2.5 A GEOMETRICAL
INTERPRETATION OF WHITE GAUSSIAN SIGNALS 158 5.2.6 UNDERSTANDING
SHANNON S THEOREM 159 5.2.7 CORRELATED GAUSSIAN SIGNALS 161 5.3
DIRTY-PAPER CODES 164 5.3-1 WATERMARKING OF GAUSSIAN SIGNALS: FIRST
APPROACH .... 164 5.3-2 COSTA S INSIGHT: WRITING ON DIRTY PAPER 170
5.3.3 SCALAR WATERMARKING 175 5.3.4 LATTICE CODES 179 5.4 SUMMARY 181
CHAPTER 6 PRACTICAL DIRTY-PAPER CODES 183 6.1 PRACTICAL CONSIDERATIONS
FOR DIRTY-PAPER CODES 183 6.1.1 EFFICIENT ENCODING ALGORITHMS 184 6.1.2
EFFICIENT DECODING ALGORITHMS 185 6.1.3 TRADEOFF BETWEEN ROBUSTNESS AND
ENCODING COST 186 6.2 BROAD APPROACHES TO DIRTY-PAPER CODE DESIGN 188
6.2.1 DIRECT BINNING 188 6.2.2 QUANTIZATION INDEX MODULATION 188 6.2.3
DITHER MODULATION 189 6.3 IMPLEMENTING DM WITH A SIMPLE LATTICE CODE 189
6.4 TYPICAL TRICKS IN IMPLEMENTING LATTICE CODES 194 6.4.1 CHOICE OF
LATTICE 194 6.4.2 DISTORTION COMPENSATION 194 6.4.3 SPREADING FUNCTIONS
195 6.4.4 DITHER 195 6.5 CODING WITH BETTER LATTICES 197 6.5.1 USING
NONORTHOGONAL LATTICES 197 6.5.2 IMPORTANT PROPERTIES OF LATTICES 199
6.5.3 CONSTRUCTING A DIRTY-PAPER CODE FROM E 8 201 6.6 MAKING LATTICE
CODES SURVIVE VALUMETRIC SCALING 204 6.6.1 SCALE-INVARIANT MARKING
SPACES 205 6.6.2 RATIONAL DITHER MODULATION 207 6.6.3 INVERTING
VALUMETRIC SCALING 208 6.7 DIRTY-PAPER TRELLIS CODES 208 6.8 SUMMARY 212
CHAPTER 7 ANALYZING ERRORS 213 7.1 MESSAGE ERRORS 214 7.2 FALSE POSITIVE
ERRORS 218 7.2.1 RANDOM-WATERMARK FALSE POSITIVE 219 7.2.2 RANDOM-WORK
FALSE POSITIVE 221 7.3 FALSE NEGATIVE ERRORS 225 7.4 ROC CURVES 228
7.4.1 HYPOTHETICAL ROC 228 7.4.2 HISTOGRAM OF A REAL SYSTEM 230 7.4.3
INTERPOLATION ALONG ONE OR BOTH AXES 231 7.5 THE EFFECT OF WHITENING ON
ERROR RATES 232 7.6 ANALYSIS OF NORMALIZED CORRELATION 239 7.6.1 FALSE
POSITIVE ANALYSIS 240 7.6.2 FALSE NEGATIVE ANALYSIS 250 7.7 SUMMARY 252
CHAPTER 8 USING PERCEPTUAL MODELS 255 8.1 EVALUATING PERCEPTUAL IMPACT
OF WATERMARKS 255 8.1.1 FIDELITY AND QUALITY 256 8.1.2 HUMAN EVALUATION
MEASUREMENT TECHNIQUES 257 8.1.3 AUTOMATED EVALUATION 260 8.2 GENERAL
FORM OF A PERCEPTUAL MODEL 263 8.2.1 SENSITIVITY 263 8.2.2 MASKING 266
8.2.3 POOLING 267 8.3 TWO EXAMPLES OF PERCEPTUAL MODELS 269 8.3.1
WATSON S DCT-BASED VISUAL MODEL 269 8.3.2 A PERCEPTUAL MODEL FOR AUDIO
273 8.4 PERCEPTUALLY ADAPTIVE WATERMARKING 277 8.4.1 PERCEPTUAL SHAPING
280 8.4.2 OPTIMAL USE OF PERCEPTUAL MODELS 287 8.5 SUMMARY 295 CONTENTS
II XI CHAPTER 9 ROBUST WATERMARKING 297 9.1 APPROACHES 298 9.1.1
REDUNDANT EMBEDDING 299 9.1.2 SPREAD SPECTRUM CODING 300 9.1.3 EMBEDDING
IN PERCEPTUALLY SIGNIFICANT COEFFICIENTS .... 301 9.1.4 EMBEDDING IN
COEFFICIENTS OF KNOWN ROBUSTNESS 302 9.1.5 INVERTING DISTORTIONS IN THE
DETECTOR 303 9.1.6 PREINVERTING DISTORTIONS IN THE EMBEDDER 304 9.2
ROBUSTNESS TO VALUMETRIC DISTORTIONS 308 9.2.1 ADDITIVE NOISE 308 9.2.2
AMPLITUDE CHANGES 312 9.2.3 LINEAR FILTERING 314 9.2.4 LOSSY COMPRESSION
319 9.2.5 QUANTIZATION 320 9.3 ROBUSTNESS TO TEMPORAL AND GEOMETRIE
DISTORTIONS 325 9.3.1 TEMPORAL AND GEOMETRIE DISTORTIONS 326 9-3.2
EXHAUSTIVE SEARCH 327 9.3.3 SYNCHRONIZATION/REGISTRATION IN BLIND
DETECTORS 328 9.3-4 AUTOCORRELATION 329 9.3.5 INVARIANT WATERMARKS 330
9.3.6 IMPLICIT SYNCHRONIZATION 331 9.4 SUMMARY 332 CHAPTER 10 WATERMARK
SECURITY 335 10.1 SECURITY REQUIREMENTS 335 10.1.1 RESTRICTING WATERMARK
OPERATIONS 336 10.1.2 PUBLIC AND PRIVATE WATERMARKING 338 10.1.3
CATEGORIES OF ATTACK 340 10.1.4 ASSUMPTIONS ABOUT THE ADVERSARY 345 10.2
WATERMARK SECURITY AND CRYPTOGRAPHY 348 10.2.1 THE ANALOGY BETWEEN
WATERMARKING AND CRYPTOGRAPHY 348 10.2.2 PREVENTING UNAUTHORIZED
DETECTION 349 10.2.3 PREVENTING UNAUTHORIZED EMBEDDING 351 10.2.4
PREVENTING UNAUTHORIZED REMOVAL 355 10.3 SOME SIGNIFICANT KNOWN ATTACKS
358 10.3-1 SCRAMBLING ATTACKS 359 10.3.2 PATHOLOGICAL DISTORTIONS 359
10.3.3 COPY ATTACKS 361 10.3.4 AMBIGUITY ATTACKS 362 10.3.5 SENSITIVITY
ANALYSIS ATTACKS 367 10.3-6 GRADIENT DESCENT ATTACKS 372 10.4 SUMMARY
373 XII I CONTENTS CHAPTER 11 CONTENT AUTHENTICATION 375 11.1 EXACT
AUTHENTICATION 377 11.1.1 FRAGILE WATERMARKS 377 11.1.2 EMBEDDED
SIGNATURES 378 11.1.3 ERASABLE WATERMARKS 379 11.2 SELECTIVE
AUTHENTICATION 395 11.2.1 LEGITIMATE VERSUS ILLEGITIMATE DISTORTIONS 395
11.2.2 SEMI-FRAGILE WATERMARKS 399 11.2.3 EMBEDDED, SEMI-FRAGILE
SIGNATURES 404 11.2.4 TELLTALE WATERMARKS 409 11.3 LOCALIZATION 410
11.3.1 BLOCK-WISE CONTENT AUTHENTICATION 411 11.32 SAMPLE-WISE CONTENT
AUTHENTICATION 412 11.3.3 SECURITY RISKS WITH LOCALIZATION 415 11.4
RESTORATION 419 11.4.1 EMBEDDED REDUNDANCY 419 11.4.2 SELF-EMBEDDING 420
11.4.3 BLIND RESTORATION 421 11.5 SUMMARY 422 CHAPTER 12 STEGANOGRAPHY
425 12.1 STEGANOGRAPHIC COMMUNICATION 427 12.1.1 THE CHANNEL 428 12.1.2
THE BUILDING BLOCKS 429 12.2 NOTATION AND TERMINOLOGY 433 12.3
INFORMATION-THEORETIC FOUNDATIONS OF STEGANOGRAPHY 433 12.3.1 CACHIN S
DEFINITION OF STEGANOGRAPHIC SECURITY 434 12.4 PRACTICAL STEGANOGRAPHIC
METHODS 439 12.4.1 STATISTICS PRESERVING STEGANOGRAPHY 439 12.4.2
MODEL-BASED STEGANOGRAPHY 441 12.4.3 MASKING EMBEDDING AS NATURAL
PROCESSING 445 12.5 MINIMIZING THE EMBEDDING IMPACT 449 12.5.1 MATRIX
EMBEDDING 450 12.5.2 NONSHARED SELECTION RULE 457 12.6 SUMMARY 467
CHAPTER 13 STEGANALYSIS 469 13-1 STEGANALYSIS SCENARIOS 469 13.1.1
DETECTION 470 13-1.2 FORENSIC STEGANALYSIS 475 13.1.3 THE INFLUENCE OF
THE COVER WORK ON STEGANALYSIS 476 13-2 SOME SIGNIFICANT STEGANALYSIS
ALGORITHMS 477 13.2.1 LSB EMBEDDING AND THE HISTOGRAM ATTACK 478
CONTENTS I XIII 13.2.2 SAMPLE PAIRS ANALYSIS 480 13-2.3 BLIND
STEGANALYSIS OF JPEG IMAGES USING CALIBRATION . . . 486 13.2.4 BLIND
STEGANALYSIS IN THE SPATIAL DOMAIN 489 13.3 SUMMARY 494 APPENDIX A
BACKGROUND CONCEPTS 497 A.L INFORMATION THEORY 497 A.L.L ENTROPY 497
A.L.2 MUTUAL INFORMATION 498 A.L.3 COMMUNICATION RATES 499 A.L.4 CHANNEL
CAPACITY 500 A.2 CODING THEORY 503 A.2.1 HAMMING DISTANCE 503 A.2.2
COVERING RADIUS 503 A.2.3 LINEAR CODES 504 A.3 CRYPTOGRAPHY 505 A.3.1
SYMMETRIE-KEY CRYPTOGRAPHY 505 A.3.2 ASYMMETRIE-KEY CRYPTOGRAPHY 506
A.3.3 ONE-WAY HASH FUNCTIONS 508 A.3.4 CRYPTOGRAPHIC SIGNATURES 510
APPENDIX B SELECTED THEORETICAL RESULTS 511 B. 1 INFORMATION-THEORETIC
ANALYSIS OF SECURE WATERMARKING (MOULIN AND O SULLIVAN) 511 B.L.L
WATERMARKING AS A GAME 511 B.1.2 GENERAL CAPACITY OF WATERMARKING 513
B.1.3 CAPACITY WITH MSE FIDELITY CONSTRAINT 514 B.2 ERROR PROBABILITIES
USING NORMALIZED CORRELATION DETECTORS (MILLER AND BLOOM) 517 B.3 EFFECT
OF QUANTIZATION NOISE ON WATERMARKS (EGGERS AND GIROD) . 522 B.3.1
BACKGROUND 524 B.3.2 BASIC APPROACH 524 B.3-3 FINDING THE PROBABILITY
DENSITY FUNCTION 524 B.3.4 FINDING THE MOMENT-GENERATING FUNCTION 525
B.3.5 DETERMINING THE EXPECTED CORRELATION FOR A GAUSSIAN WATERMARK AND
LAPLACIAN CONTENT 527 APPENDIX C NOTATION AND COMMON VARIABLES 529 C.L
VARIABLE NAMING CONVENTIONS 529 C.2 OPERATORS 530 C.3 COMMON VARIABLE
NAMES 530 C.4 COMMON FUNCTIONS 532 XIV I CONTENTS GLOSSARY 533
REFERENCES 549 INDEX 575 ABOUT THE AUTHORS 591
|
adam_txt |
DIGITAL WATERMARKING AND STEGANOGRAPHY SECOND EDITION INGEMAR J. COX
MATTHEW L. MILLER JEFFREY A. BLOOM JESSICA FRIDRICH TON KALKER * *;.**,
AMSTERDAM * BOSTON * HEIDELBERG * LONDON NEW YORK * OXFORD * PARIS * SAN
DIEGO .*-&WAEJ»FTE. SAN FRAN CISCO * SINGAPORE * SYDNEY * TOKYO ^ ^ 1 ^
^ ELSEVIER MORGAN KAUFMANN PUBLISHERS IS AN IMPRINT OF ELSEVIER MORGAN
KAUFMANN PUBLISHERS CONTENTS PREFACE TO THE FIRST EDITION XV PREFACE TO
THE SECOND EDITION XIX EXAMPLE WATERMARKING SYSTEMS XXI CHAPTER 1
INTRODUCTION 1 1.1 INFORMATION HIDING, STEGANOGRAPHY, AND WATERMARKING 4
1.2 HISTORY OF WATERMARKING 6 1.3 HISTORY OF STEGANOGRAPHY 9 1.4
IMPORTANCE OF DIGITAL WATERMARKING 11 1.5 IMPORTANCE OF STEGANOGRAPHY 12
CHAPTER 2 APPLICATIONS AND PROPERTIES 15 2.1 APPLICATIONS OF
WATERMARKING 16 2.1.1 BROADCAST MONITORING 16 2.1.2 OWNER IDENTIFICATION
19 2.1.3 PROOF OF OWNERSHIP 21 2.1.4 TRANSACTION TRACKING 23 2.1.5
CONTENT AUTHENTICATION 25 2.1.6 COPY CONTROL 27 2.1.7 DEVICE CONTROL 31
2.1.8 LEGACY ENHANCEMENT 32 2.2 APPLICATIONS OF STEGANOGRAPHY 34 2.2.1
STEGANOGRAPHY FOR DISSIDENTS 34 2.2.2 STEGANOGRAPHY FOR CRIMINALS 35 2.3
PROPERTIES OF WATERMARKING SYSTEMS 36 2.3.1 EMBEDDING EFFECTIVENESS 37
2.3.2 FIDELITY 37 2.3.3 DATAPAYLOAD 38 2.3.4 BLIND OR INFORMED DETECTION
39 2.3.5 FALSE POSITIVE RATE 39 2.3.6 ROBUSTNESS 40 2.3.7 SECURITY 41
2.3.8 CIPHER AND WATERMARK KEYS 43 2.3.9 MODIFICATION AND MULTIPLE
WATERMARKS 45 2.3.10 COST 46 2.4 EVALUATING WATERMARKING SYSTEMS 46
2.4.1 THE NOTION OF "BEST" 47 2.4.2 BENCHMARKING 47 2.4.3 SCOPE OF
TESTING 48 VUE VIII I CONTENTS 2.5 PROPERTIES OF STEGANOGRAPHIC AND
STEGANALYSIS SYSTEMS 49 2.5.1 EMBEDDING EFFECTIVENESS 49 2.5.2 FIDELITY
50 2.5.3 STEGANOGRAPHIC CAPACITY EMBEDDING CAPACITY EMBEDDING EFFICIENCY
AND DATA PAYLOAD 50 2.5.4 BLIND OR INFORMED EXTRACTION 51 2.5.5 BLIND OR
TARGETED STEGANALYSIS 51 2.5.6 STATISTICAL UNDETECTABILITY 52 2.5.7
FALSE ALARM RATE 53 2.5.8 ROBUSTNESS 53 2.5.9 SECURITY 54 2.5.10 STEGO
KEY 54 2.6 EVALUATING AND TESTING STEGANOGRAPHIC SYSTEMS 55 2.7 SUMMARY
56 CHAPTER3 MODELS OF WATERMARKING 6I 3.1 NOTATION 62 3.2 COMMUNICATIONS
63 3.2.1 COMPONENTS OF COMMUNICATIONS SYSTEMS 63 3.2.2 CLASSES OF
TRANSMISSION CHANNELS 64 3.2.3 SECURE TRANSMISSION 65 3.3
COMMUNICATION-BASED MODELS OF WATERMARKING 67 3.3.1 BASIC MODEL 67 3.3.2
WATERMARKING AS COMMUNICATIONS WITH SIDE INFORMATION AT THE TRANSMITTER
75 3-3-3 WATERMARKING AS MULTIPLEXED COMMUNICATIONS 78 3-4 GEOMETRIE
MODELS OF WATERMARKING 80 3-4.1 DISTRIBUTIONS AND REGIONS IN MEDIA SPACE
81 3-4.2 MARKING SPACES 87 3.5 MODELING WATERMARK DETECTION BY
CORRELATION 95 3-5.1 LINEAR CORRELATION 96 3-5-2 NORMALIZED CORRELATION
97 3-5.3 CORRELATION COEFFICIENT 100 3.6 SUMMARY 102 CHAPTER 4 BASIC
MESSAGE CODING 105 4.1 MAPPING MESSAGES INTO MESSAGE VECTORS 106 4.1.1
DIRECT MESSAGE CODING 106 4.1.2 MULTISYMBOL MESSAGE CODING 110 4.2 ERROR
CORRECTION CODING 117 4.2.1 THE PROBLEM WITH SIMPLE MULTISYMBOL MESSAGES
117 4.2.2 THE IDEA OF ERROR CORRECTION CODES 118 4.2.3 EXAMPLE: TRELLIS
CODES AND VITERBI DECODING 119 CONTENTS I IX 4.3 DETECTING MULTISYMBOL
WATERMARKS 124 4.3.1 DETECTION BY LOOKING FOR VALID MESSAGES 125 4.3.2
DETECTION BY DETECTING INDIVIDUAL SYMBOLS 126 4.3.3 DETECTION BY
COMPARING AGAINST QUANTIZED VECTORS . . . 128 4.4 SUMMARY 134 CHAPTER 5
WATERMARKING WITH SIDE INFORMATION 137 5.1 INFORMED EMBEDDING 139 5.1.1
EMBEDDING AS AN OPTIMIZATION PROBLEM 140 5.1.2 OPTIMIZING WITH RESPECT
TO A DETECTION STATISTIC 141 5.1.3 OPTIMIZING WITH RESPECT TO AN
ESTIMATE OF ROBUSTNESS 147 5.2 WATERMARKING USING SIDE INFORMATION 153
5.2.1 FORMAL DEFINITION OF THE PROBLEM 153 5.2.2 SIGNAL AND CHANNEL
MODELS 155 5.2.3 OPTIMAL WATERMARKING FOR A SINGLE COVER WORK 156 5.2.4
OPTIMAL CODING FOR MULTIPLE COVER WORKS 157 5.2.5 A GEOMETRICAL
INTERPRETATION OF WHITE GAUSSIAN SIGNALS 158 5.2.6 UNDERSTANDING
SHANNON'S THEOREM 159 5.2.7 CORRELATED GAUSSIAN SIGNALS 161 5.3
DIRTY-PAPER CODES 164 5.3-1 WATERMARKING OF GAUSSIAN SIGNALS: FIRST
APPROACH . 164 5.3-2 COSTA'S INSIGHT: WRITING ON DIRTY PAPER 170
5.3.3 SCALAR WATERMARKING 175 5.3.4 LATTICE CODES 179 5.4 SUMMARY 181
CHAPTER 6 PRACTICAL DIRTY-PAPER CODES 183 6.1 PRACTICAL CONSIDERATIONS
FOR DIRTY-PAPER CODES 183 6.1.1 EFFICIENT ENCODING ALGORITHMS 184 6.1.2
EFFICIENT DECODING ALGORITHMS 185 6.1.3 TRADEOFF BETWEEN ROBUSTNESS AND
ENCODING COST 186 6.2 BROAD APPROACHES TO DIRTY-PAPER CODE DESIGN 188
6.2.1 DIRECT BINNING 188 6.2.2 QUANTIZATION INDEX MODULATION 188 6.2.3
DITHER MODULATION 189 6.3 IMPLEMENTING DM WITH A SIMPLE LATTICE CODE 189
6.4 TYPICAL TRICKS IN IMPLEMENTING LATTICE CODES 194 6.4.1 CHOICE OF
LATTICE 194 6.4.2 DISTORTION COMPENSATION 194 6.4.3 SPREADING FUNCTIONS
195 6.4.4 DITHER 195 6.5 CODING WITH BETTER LATTICES 197 6.5.1 USING
NONORTHOGONAL LATTICES 197 6.5.2 IMPORTANT PROPERTIES OF LATTICES 199
6.5.3 CONSTRUCTING A DIRTY-PAPER CODE FROM E 8 201 6.6 MAKING LATTICE
CODES SURVIVE VALUMETRIC SCALING 204 6.6.1 SCALE-INVARIANT MARKING
SPACES 205 6.6.2 RATIONAL DITHER MODULATION 207 6.6.3 INVERTING
VALUMETRIC SCALING 208 6.7 DIRTY-PAPER TRELLIS CODES 208 6.8 SUMMARY 212
CHAPTER 7 ANALYZING ERRORS 213 7.1 MESSAGE ERRORS 214 7.2 FALSE POSITIVE
ERRORS 218 7.2.1 RANDOM-WATERMARK FALSE POSITIVE 219 7.2.2 RANDOM-WORK
FALSE POSITIVE 221 7.3 FALSE NEGATIVE ERRORS 225 7.4 ROC CURVES 228
7.4.1 HYPOTHETICAL ROC 228 7.4.2 HISTOGRAM OF A REAL SYSTEM 230 7.4.3
INTERPOLATION ALONG ONE OR BOTH AXES 231 7.5 THE EFFECT OF WHITENING ON
ERROR RATES 232 7.6 ANALYSIS OF NORMALIZED CORRELATION 239 7.6.1 FALSE
POSITIVE ANALYSIS 240 7.6.2 FALSE NEGATIVE ANALYSIS 250 7.7 SUMMARY 252
CHAPTER 8 USING PERCEPTUAL MODELS 255 8.1 EVALUATING PERCEPTUAL IMPACT
OF WATERMARKS 255 8.1.1 FIDELITY AND QUALITY 256 8.1.2 HUMAN EVALUATION
MEASUREMENT TECHNIQUES 257 8.1.3 AUTOMATED EVALUATION 260 8.2 GENERAL
FORM OF A PERCEPTUAL MODEL 263 8.2.1 SENSITIVITY 263 8.2.2 MASKING 266
8.2.3 POOLING 267 8.3 TWO EXAMPLES OF PERCEPTUAL MODELS 269 8.3.1
WATSON'S DCT-BASED VISUAL MODEL 269 8.3.2 A PERCEPTUAL MODEL FOR AUDIO
273 8.4 PERCEPTUALLY ADAPTIVE WATERMARKING 277 8.4.1 PERCEPTUAL SHAPING
280 8.4.2 OPTIMAL USE OF PERCEPTUAL MODELS 287 8.5 SUMMARY 295 CONTENTS
II XI CHAPTER 9 ROBUST WATERMARKING 297 9.1 APPROACHES 298 9.1.1
REDUNDANT EMBEDDING 299 9.1.2 SPREAD SPECTRUM CODING 300 9.1.3 EMBEDDING
IN PERCEPTUALLY SIGNIFICANT COEFFICIENTS . 301 9.1.4 EMBEDDING IN
COEFFICIENTS OF KNOWN ROBUSTNESS 302 9.1.5 INVERTING DISTORTIONS IN THE
DETECTOR 303 9.1.6 PREINVERTING DISTORTIONS IN THE EMBEDDER 304 9.2
ROBUSTNESS TO VALUMETRIC DISTORTIONS 308 9.2.1 ADDITIVE NOISE 308 9.2.2
AMPLITUDE CHANGES 312 9.2.3 LINEAR FILTERING 314 9.2.4 LOSSY COMPRESSION
319 9.2.5 QUANTIZATION 320 9.3 ROBUSTNESS TO TEMPORAL AND GEOMETRIE
DISTORTIONS 325 9.3.1 TEMPORAL AND GEOMETRIE DISTORTIONS 326 9-3.2
EXHAUSTIVE SEARCH 327 9.3.3 SYNCHRONIZATION/REGISTRATION IN BLIND
DETECTORS 328 9.3-4 AUTOCORRELATION 329 9.3.5 INVARIANT WATERMARKS 330
9.3.6 IMPLICIT SYNCHRONIZATION 331 9.4 SUMMARY 332 CHAPTER 10 WATERMARK
SECURITY 335 10.1 SECURITY REQUIREMENTS 335 10.1.1 RESTRICTING WATERMARK
OPERATIONS 336 10.1.2 PUBLIC AND PRIVATE WATERMARKING 338 10.1.3
CATEGORIES OF ATTACK 340 10.1.4 ASSUMPTIONS ABOUT THE ADVERSARY 345 10.2
WATERMARK SECURITY AND CRYPTOGRAPHY 348 10.2.1 THE ANALOGY BETWEEN
WATERMARKING AND CRYPTOGRAPHY 348 10.2.2 PREVENTING UNAUTHORIZED
DETECTION 349 10.2.3 PREVENTING UNAUTHORIZED EMBEDDING 351 10.2.4
PREVENTING UNAUTHORIZED REMOVAL 355 10.3 SOME SIGNIFICANT KNOWN ATTACKS
358 10.3-1 SCRAMBLING ATTACKS 359 10.3.2 PATHOLOGICAL DISTORTIONS 359
10.3.3 COPY ATTACKS 361 10.3.4 AMBIGUITY ATTACKS 362 10.3.5 SENSITIVITY
ANALYSIS ATTACKS 367 10.3-6 GRADIENT DESCENT ATTACKS 372 10.4 SUMMARY
373 XII I CONTENTS CHAPTER 11 CONTENT AUTHENTICATION 375 11.1 EXACT
AUTHENTICATION 377 11.1.1 FRAGILE WATERMARKS 377 11.1.2 EMBEDDED
SIGNATURES 378 11.1.3 ERASABLE WATERMARKS 379 11.2 SELECTIVE
AUTHENTICATION 395 11.2.1 LEGITIMATE VERSUS ILLEGITIMATE DISTORTIONS 395
11.2.2 SEMI-FRAGILE WATERMARKS 399 11.2.3 EMBEDDED, SEMI-FRAGILE
SIGNATURES 404 11.2.4 TELLTALE WATERMARKS 409 11.3 LOCALIZATION 410
11.3.1 BLOCK-WISE CONTENT AUTHENTICATION 411 11.32 SAMPLE-WISE CONTENT
AUTHENTICATION 412 11.3.3 SECURITY RISKS WITH LOCALIZATION 415 11.4
RESTORATION 419 11.4.1 EMBEDDED REDUNDANCY 419 11.4.2 SELF-EMBEDDING 420
11.4.3 BLIND RESTORATION 421 11.5 SUMMARY 422 CHAPTER 12 STEGANOGRAPHY
425 12.1 STEGANOGRAPHIC COMMUNICATION 427 12.1.1 THE CHANNEL 428 12.1.2
THE BUILDING BLOCKS 429 12.2 NOTATION AND TERMINOLOGY 433 12.3
INFORMATION-THEORETIC FOUNDATIONS OF STEGANOGRAPHY 433 12.3.1 CACHIN'S
DEFINITION OF STEGANOGRAPHIC SECURITY 434 12.4 PRACTICAL STEGANOGRAPHIC
METHODS 439 12.4.1 STATISTICS PRESERVING STEGANOGRAPHY 439 12.4.2
MODEL-BASED STEGANOGRAPHY 441 12.4.3 MASKING EMBEDDING AS NATURAL
PROCESSING 445 12.5 MINIMIZING THE EMBEDDING IMPACT 449 12.5.1 MATRIX
EMBEDDING 450 12.5.2 NONSHARED SELECTION RULE 457 12.6 SUMMARY 467
CHAPTER 13 STEGANALYSIS 469 13-1 STEGANALYSIS SCENARIOS 469 13.1.1
DETECTION 470 13-1.2 FORENSIC STEGANALYSIS 475 13.1.3 THE INFLUENCE OF
THE COVER WORK ON STEGANALYSIS 476 13-2 SOME SIGNIFICANT STEGANALYSIS
ALGORITHMS 477 13.2.1 LSB EMBEDDING AND THE HISTOGRAM ATTACK 478
CONTENTS I XIII 13.2.2 SAMPLE PAIRS ANALYSIS 480 13-2.3 BLIND
STEGANALYSIS OF JPEG IMAGES USING CALIBRATION . . . 486 13.2.4 BLIND
STEGANALYSIS IN THE SPATIAL DOMAIN 489 13.3 SUMMARY 494 APPENDIX A
BACKGROUND CONCEPTS 497 A.L INFORMATION THEORY 497 A.L.L ENTROPY 497
A.L.2 MUTUAL INFORMATION 498 A.L.3 COMMUNICATION RATES 499 A.L.4 CHANNEL
CAPACITY 500 A.2 CODING THEORY 503 A.2.1 HAMMING DISTANCE 503 A.2.2
COVERING RADIUS 503 A.2.3 LINEAR CODES 504 A.3 CRYPTOGRAPHY 505 A.3.1
SYMMETRIE-KEY CRYPTOGRAPHY 505 A.3.2 ASYMMETRIE-KEY CRYPTOGRAPHY 506
A.3.3 ONE-WAY HASH FUNCTIONS 508 A.3.4 CRYPTOGRAPHIC SIGNATURES 510
APPENDIX B SELECTED THEORETICAL RESULTS 511 B. 1 INFORMATION-THEORETIC
ANALYSIS OF SECURE WATERMARKING (MOULIN AND O'SULLIVAN) 511 B.L.L
WATERMARKING AS A GAME 511 B.1.2 GENERAL CAPACITY OF WATERMARKING 513
B.1.3 CAPACITY WITH MSE FIDELITY CONSTRAINT 514 B.2 ERROR PROBABILITIES
USING NORMALIZED CORRELATION DETECTORS (MILLER AND BLOOM) 517 B.3 EFFECT
OF QUANTIZATION NOISE ON WATERMARKS (EGGERS AND GIROD) . 522 B.3.1
BACKGROUND 524 B.3.2 BASIC APPROACH 524 B.3-3 FINDING THE PROBABILITY
DENSITY FUNCTION 524 B.3.4 FINDING THE MOMENT-GENERATING FUNCTION 525
B.3.5 DETERMINING THE EXPECTED CORRELATION FOR A GAUSSIAN WATERMARK AND
LAPLACIAN CONTENT 527 APPENDIX C NOTATION AND COMMON VARIABLES 529 C.L
VARIABLE NAMING CONVENTIONS 529 C.2 OPERATORS 530 C.3 COMMON VARIABLE
NAMES 530 C.4 COMMON FUNCTIONS 532 XIV I CONTENTS GLOSSARY 533
REFERENCES 549 INDEX 575 ABOUT THE AUTHORS 591 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Shih, Frank Y. |
author_GND | (DE-588)141751754 |
author_facet | Shih, Frank Y. |
author_role | aut |
author_sort | Shih, Frank Y. |
author_variant | f y s fy fys |
building | Verbundindex |
bvnumber | BV023202465 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)493764076 (DE-599)BVBBV023202465 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01942nam a2200493zc 4500</leader><controlfield tag="001">BV023202465</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090623 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080307s2008 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007034224</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1420047574</subfield><subfield code="c">alk. paper</subfield><subfield code="9">1-4200-4757-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781420047578</subfield><subfield code="9">978-1-4200-4757-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)493764076</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023202465</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shih, Frank Y.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)141751754</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital watermarking and steganography</subfield><subfield code="b">fundamentals and techniques</subfield><subfield code="c">Frank Y. Shih</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, Fl. [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">180 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Propriété intellectuelle</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Protection de l'information (informatique)</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Multimedia systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intellectual property</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Elektronisches Wasserzeichen</subfield><subfield code="0">(DE-588)4572344-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Steganographie</subfield><subfield code="0">(DE-588)4617648-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0745/2007034224-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016388666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016388666</subfield></datafield></record></collection> |
id | DE-604.BV023202465 |
illustrated | Illustrated |
index_date | 2024-07-02T20:08:38Z |
indexdate | 2024-07-09T21:12:57Z |
institution | BVB |
isbn | 1420047574 9781420047578 |
language | English |
lccn | 2007034224 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016388666 |
oclc_num | 493764076 |
open_access_boolean | |
owner | DE-92 DE-M382 |
owner_facet | DE-92 DE-M382 |
physical | 180 S. Ill., graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | CRC Press |
record_format | marc |
spelling | Shih, Frank Y. Verfasser (DE-588)141751754 aut Digital watermarking and steganography fundamentals and techniques Frank Y. Shih Boca Raton, Fl. [u.a.] CRC Press 2008 180 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Propriété intellectuelle ram Protection de l'information (informatique) ram Systèmes informatiques - Mesures de sûreté ram Computer security Multimedia systems Security measures Intellectual property Elektronisches Wasserzeichen (DE-588)4572344-8 gnd rswk-swf Steganographie (DE-588)4617648-2 gnd rswk-swf Elektronisches Wasserzeichen (DE-588)4572344-8 s DE-604 Steganographie (DE-588)4617648-2 s http://www.loc.gov/catdir/enhancements/fy0745/2007034224-d.html Publisher description GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016388666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Shih, Frank Y. Digital watermarking and steganography fundamentals and techniques Propriété intellectuelle ram Protection de l'information (informatique) ram Systèmes informatiques - Mesures de sûreté ram Computer security Multimedia systems Security measures Intellectual property Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Steganographie (DE-588)4617648-2 gnd |
subject_GND | (DE-588)4572344-8 (DE-588)4617648-2 |
title | Digital watermarking and steganography fundamentals and techniques |
title_auth | Digital watermarking and steganography fundamentals and techniques |
title_exact_search | Digital watermarking and steganography fundamentals and techniques |
title_exact_search_txtP | Digital watermarking and steganography fundamentals and techniques |
title_full | Digital watermarking and steganography fundamentals and techniques Frank Y. Shih |
title_fullStr | Digital watermarking and steganography fundamentals and techniques Frank Y. Shih |
title_full_unstemmed | Digital watermarking and steganography fundamentals and techniques Frank Y. Shih |
title_short | Digital watermarking and steganography |
title_sort | digital watermarking and steganography fundamentals and techniques |
title_sub | fundamentals and techniques |
topic | Propriété intellectuelle ram Protection de l'information (informatique) ram Systèmes informatiques - Mesures de sûreté ram Computer security Multimedia systems Security measures Intellectual property Elektronisches Wasserzeichen (DE-588)4572344-8 gnd Steganographie (DE-588)4617648-2 gnd |
topic_facet | Propriété intellectuelle Protection de l'information (informatique) Systèmes informatiques - Mesures de sûreté Computer security Multimedia systems Security measures Intellectual property Elektronisches Wasserzeichen Steganographie |
url | http://www.loc.gov/catdir/enhancements/fy0745/2007034224-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016388666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT shihfranky digitalwatermarkingandsteganographyfundamentalsandtechniques |