Preface |
|
xiii | |
|
|
|
|
1 | (1) |
|
|
2 | (3) |
|
Relative Importance of Cover Signals |
|
|
3 | (1) |
|
|
4 | (1) |
|
Oblivious and Nonoblivious |
|
|
4 | (1) |
|
Synchronous and Asynchronous |
|
|
4 | (1) |
|
Active and Passive Wardens |
|
|
5 | (1) |
|
Properties of Steganographic Communications |
|
|
5 | (3) |
|
|
6 | (2) |
|
The Steganographic Channel |
|
|
8 | (6) |
|
Frameworks for Data Hiding |
|
|
|
Signal Processing Framework |
|
|
14 | (1) |
|
Data Hiding from a Communications Perspective |
|
|
15 | (2) |
|
Relationship Between Communications and Signal Processing Frameworks |
|
|
17 | (3) |
|
A Review of Data Hiding Methods |
|
|
20 | (7) |
|
Communication with Side Information and Data Hiding |
|
|
|
|
27 | (3) |
|
A Framework Based on Channel Adaptive Encoding and Channel Independent Decoding |
|
|
30 | (5) |
|
Highlights of the CAE-CID Framework |
|
|
34 | (1) |
|
On the Duality of Communications and Data Hiding Frameworks |
|
|
35 | (5) |
|
Codebook Generation for Data Hiding Methods |
|
|
40 | (10) |
|
Type I (Linear) Data Hiding |
|
|
|
Linear Data Hiding in Transform Domain |
|
|
50 | (1) |
|
|
51 | (1) |
|
Capacity of Additive Noise Channels |
|
|
52 | (6) |
|
|
58 | (3) |
|
|
59 | (1) |
|
Modeling Processing Noise |
|
|
59 | (2) |
|
|
61 | (2) |
|
Channel Capacity vs. Choice of Transform |
|
|
63 | (3) |
|
Some Capacity Results and Discussions |
|
|
66 | (8) |
|
|
74 | (2) |
|
Factors Influencing Choice of Transform |
|
|
76 | (3) |
|
Type II and Type III (Nonlinear) Data Hiding Methods |
|
|
|
Type II Embedding and Detection |
|
|
79 | (4) |
|
Type III Embedding and Detection Methods |
|
|
83 | (15) |
|
|
85 | (1) |
|
Vectoral Embedding and Detection |
|
|
86 | (1) |
|
Scalar Embedding and Detection |
|
|
87 | (1) |
|
|
87 | (1) |
|
Minimum Distance Decoding |
|
|
88 | (2) |
|
|
90 | (1) |
|
Optimization Criteria for Embedding and Detection Parameters |
|
|
91 | (1) |
|
Optimization of Parameters for Vectoral Embedding and Detection |
|
|
91 | (1) |
|
Optimization of Parameters for Scalar Embedding and Detection |
|
|
92 | (3) |
|
|
95 | (1) |
|
Minimizing Probability of Error |
|
|
96 | (2) |
|
Maximizing Mutual Information |
|
|
98 | (1) |
|
|
98 | (10) |
|
|
|
|
108 | (5) |
|
Multiple Codebook Data Hiding |
|
|
113 | (41) |
|
A Channel Model for Multiple Codebook Data Hiding |
|
|
119 | (6) |
|
Single Codebook Data Hiding Based on the Maximum Correlation Criterion |
|
|
125 | (2) |
|
|
127 | (1) |
|
|
128 | (2) |
|
Multiple Codebook Data Hiding Using the Maximum Correlation Criterion |
|
|
130 | (2) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Single Codebook Hiding Using the Minimum Distance Criterion |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Multiple Codebook Hiding Using the Minimum Distance Criterion |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (8) |
|
Implementation and Simulation Results |
|
|
147 | (7) |
|
|
|
|
154 | (6) |
|
|
154 | (1) |
|
|
155 | (1) |
|
Cyclic All-Pass Sequences |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (10) |
|
Autocorrelation for Restoring the Cropped Signal |
|
|
162 | (3) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (3) |
|
|
170 | (2) |
|
Attacks on Data Hiding Systems |
|
|
172 | (7) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Desynchronization Attacks |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
Template and Periodicity Removal |
|
|
175 | (1) |
|
Security/Cryptographic Attacks |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
Future Direction in Attack Design |
|
|
176 | (3) |
|
|
|
Design of Data Hiding Methods Robust to Lossy Compression |
|
|
179 | (15) |
|
Data Hiding for Secure Multimedia Delivery |
|
|
180 | (2) |
|
Compression and Data Hiding |
|
|
182 | (1) |
|
Data Hiding with Known Compression |
|
|
183 | (2) |
|
Simultaneous Robustness to Multiple Compression Techniques |
|
|
185 | (2) |
|
Robustness to Unknown Compression Methods |
|
|
187 | (1) |
|
Utilizing the ``Hole'' in Compression Techniques |
|
|
187 | (4) |
|
|
191 | (3) |
|
Type III Hiding for Lossy Compression |
|
|
194 | (5) |
|
Joint Embedding and Compression |
|
|
195 | (2) |
|
Results for JPEG Compression |
|
|
197 | (2) |
|
Watermarking for Ownership |
|
|
199 | (22) |
|
Counterfeit Attacks on Watermarks |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Overcoming Attacks on Watermarks |
|
|
207 | (2) |
|
Restrictions on Choice of Signature |
|
|
209 | (1) |
|
Attacking Scheme III (Craver's Protocol) |
|
|
210 | (1) |
|
Quasi-Oblivious Watermarking |
|
|
211 | (2) |
|
Detection Statistic for Quasi-Oblivious Watermarking |
|
|
213 | (1) |
|
|
214 | (2) |
|
An Example of a Watermarking Scheme |
|
|
216 | (5) |
|
APPENDIX A CAE-CID Framework under Varying |
|
|
|
|
221 | (2) |
|
APPENDIX B Statistics of pdep\P and ddep\P |
|
|
223 | (8) |
|
APPENDIX C Mathematical Proofs |
|
|
|
|
229 | (1) |
|
|
230 | (1) |
Bibliography |
|
231 | (8) |
Index |
|
239 | |