Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications
Data authentication is another common application of digital data, hiding. The authenticity and integrity of protected data are obtained by hiding a fragile signal within them. The fragile signal is such that the hidden data is lost or altered as soon as the host data undergoes any modification: los...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1359 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1359 |
---|---|
record_format |
dspace |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Data authentication is another common application of digital data, hiding. The authenticity and integrity of protected data are obtained by hiding a fragile signal within them. The fragile signal is such that the hidden data is lost or altered as soon as the host data undergoes any modification: loss or alteration of the hidden data is ta.ken as an evidence that the host signal has been tampered with, whereas the recovery of the information contained within the data is used to demonstrate data authenticity. In this case, the hidden data can be seen as a kind of trap, since a forger is likely to modify it inadvertently, thus leaving a trace of its action (be it malicious or not). Of course, the need to not alter the quality of t,he host signal is a furt,her motivation behind the willingness to conceal carefully the mthenticating information. |
format |
Book |
author |
Barni, Mauro Bartolini, Franco |
spellingShingle |
Barni, Mauro Bartolini, Franco Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications |
author_facet |
Barni, Mauro Bartolini, Franco |
author_sort |
Barni, Mauro |
title |
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications |
title_short |
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications |
title_full |
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications |
title_fullStr |
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications |
title_full_unstemmed |
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications |
title_sort |
watermarking systems engineering: enabling digital assets security and other applications |
publisher |
CRC Press |
publishDate |
2009 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1359 |
_version_ |
1757665582522564608 |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-13592010-03-30T07:05:53Z Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications Barni, Mauro Bartolini, Franco Data authentication is another common application of digital data, hiding. The authenticity and integrity of protected data are obtained by hiding a fragile signal within them. The fragile signal is such that the hidden data is lost or altered as soon as the host data undergoes any modification: loss or alteration of the hidden data is ta.ken as an evidence that the host signal has been tampered with, whereas the recovery of the information contained within the data is used to demonstrate data authenticity. In this case, the hidden data can be seen as a kind of trap, since a forger is likely to modify it inadvertently, thus leaving a trace of its action (be it malicious or not). Of course, the need to not alter the quality of t,he host signal is a furt,her motivation behind the willingness to conceal carefully the mthenticating information. Series introduction Preface 1 Introduction * Elements of a watermarking system * Information coding * Embedding * Concealment * Watermark impairments * Recovery of the hidden information * Protocol considerations * Capacity of watermarking techniques * Multiple embedding * Robustness * Blind vs . non-blind recovery * Private vs . public watermarking * Readable vs . detectable watermarks * Invertibility and quasi-invertibility * Reversibility * Asymmetric watermarking * Audio vs image vs video assets * Further reading 2 Applications * IPR protection * Demonstration of rightful ownership * Fingerprinting * Copy control * Authentication * Cryptography vs watermarking * A general authentication framework * Requirements of data-hiding-based authentication * Data hiding for multimedia transmission * Data compression * Error recovery * Annotation watermarks * Labelling for data retrieval * Bridging the gap between analog and digital objects * Covert communications * Further reading 3 Information coding * Information coding in detectable watermarking * Spread spectrum watermarking * Orthogonal waveforms waterma.rking * Orthogonal vs PN watermarking * Self-synchronizing PN sequences * Power spectrum shaping * Chaotic sequences * Direct embedding * Waveform-based readable watermarking * Information coding through M-ary si g * Position encoding * Binary signaling * Direct embedding readable watermarking * Direct embedding binary signalling with bit repetition * Channel coding * Block codes * Convolutional codes * Coding vs bit repetition * Channel coding vs orthogonal signaling * Informed coding * Further reading 4 Data embedding * Feature selection * Watermarking in the asset domain * Watermarking in a transformed domain * Hybrid techniques * Watermarking in the compressed domain * Miscellaneous non-conventional choices of the feature set * Blind embedding * Additive watermarking * Multiplicative watermarking * Informed embedding * Detectable watermarking * Readable watermarking * Further reading 5 Data concealment * The Human Visual System * The Weber law and the contrast * The contrast sensitivity function * The masking effect * Mapping luminance to images * Perception of color stimuli * Perception of tim6varying stinluli * The Human Auditory System (HAS) * The masking effect * Concealment through feature selectio * Concealmer~t through signal adaptation * Concealment through perceptual masks * Concealment relying on visibility thresholds * Heuristic approaches for still images * A theoretically funded perceptual threshold for still images * MPEG-based concealment for audio * Application oriented concealment * Video surveillance systems * Remote sensing images * Further reading 6 Data recovery * Watermark detection * A hypothesis testing problem * AWGN channel * Additive / Generalized Gaussian channel * Signal dependent noise with host rejection at the embedder * Taking perceptual masking into account * Multiplicative Gaussian channel * Multiplicative Weibull channel * Multichannel detection * Decoding * General problem for binary signalling * Binary signaling through AWGN channel * Generalized Gaussian channel * Multiplicative watermarking with Gaussian noise * Multiplicat. ive watermarking of Weibull-distributed features * Quantization Index Modulation * Decoding in the presence of channel coding * Assessment of watermark presence * Further reading 7 Watermark impairments and benchmarking * Classification of attacks * Measuring obtrusiveness and attack strength * Gaussian noise addition * Additive vs nlultiplicative watermarking * Spread Spectrum vs QIM watermarking * Conventional signal processing * The gain attack * Histogram equalization * Filtering * Lossy coding * Quantization of the watermarked features * Geometric manipulations * Asset translation * Asset zooming * Image rotation * More complex geometric transformations * Countermeasures against geometric manipulations * Editing * Digital to analog and analog to digital conversion * Malicious attacks * Attack estimation * Benchmarkin * Early benchmarking systems * StirMark * Improving conventional systems * A new benchmarking structure * Further reading 8 Security issues * Security by obscurity * The synln~etric case * The asymmetric case * Playing open cards * Security based on protocol design * Further reading 9 An information theoretic perspective * Some historical notes * The watermarking game * The rules of the game * Some selected results * Capacity under average distortion constraints * The additive attack watermarking game * Game definition and main results * Costa's writing on dirty paper * Lattice-based capacity-achieving watermarking * Equi-energetic structured code-books * Further reading Bibliography 2009-11-27T09:32:17Z 2009-11-27T09:32:17Z 2004 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1359 en application/octet-stream CRC Press |