Digital Watermarking and Steganography

By

  • Ingemar Cox, Professor, University College, London, U.K.
  • Matthew Miller, NEC, Princeton, NJ, U.S.A.
  • Jeffrey Bloom, Thomson, Princeton, NJ, U.S.A.
  • Jessica Fridrich, SUNY Binghamton, Binghamton, NY, U.S.A.
  • Ton Kalker, Hewlett-Packard Labs, Palo Alto, CA, U.S.A.

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
View full description

Audience

Computer engineers, government agencies, digital rights managers, network security managers, producers of electronic content, researchers, students

 

Book information

  • Published: November 2007
  • Imprint: MORGAN KAUFMANN
  • ISBN: 978-0-12-372585-1


Table of Contents

Chapter One: IntroductionChapter Two: Applications and PropertiesChapter Three: Models of WatermarkingChapter Four: Message CodingChapter Five: Watermarking with Side InformationChapter Six: Structured Dirty-Paper CodesChapter Seven: Analyzing ErrorsChapter Eight: Using Perceptual ModelsChapter Nine: Robust WatermarkingChapter Ten: Watermark SecurityChapter Eleven: Content AuthenticationChapter Twelve: Steganography and Steganalysis