Muutke küpsiste eelistusi

E-raamat: Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia

(New Jersey Institute of Technology, Newark, NJ, USA), (Polytechnic University, Brooklyn, New York), (New Jersey Institute of Technology, Newark, New Jersey)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 09-Sep-2004
  • Kirjastus: Academic Press Inc
  • Keel: eng
  • ISBN-13: 9780080488660
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 61,35 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 09-Sep-2004
  • Kirjastus: Academic Press Inc
  • Keel: eng
  • ISBN-13: 9780080488660
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.

Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.

* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.

Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.

* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Arvustused

... this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field.” Dan Bergevin of Catfield International, Security Management

This is a readable book and of importance to those with a special interest in the growing number of multimediea technologies now being applied to the internet services. Cyberneticians and systemists will find the book of interest and those who are directly involved with these online activities need to read it.” D.M. Hutton, Kybernetes, Volume 34, Issue 7+8, 2005

"With Data Hiding Fundamentals and Applications, the three authors seek to fill a broad gap in the literature of digital multimedia security. Steganography, the art of hiding information in multimedia content, is discussed in meticulous detail in various contexts. But if you dont savor complex equations and block diagrams, this book isnt for you... Because of its high level of information, this book is recommended to computer programming professionals, technical intelligence personnel, and select students in the hard sciences. It is also recommended to data-hiding professionals who wish to expand or refresh their skills in this vital and rapidly expanding field." Security Management

Muu info

The state-of-the-art in digital content security solutions!
Preface xiii
Introduction
What Is Data Hiding?
1(1)
Forms of Data Hiding
2(3)
Relative Importance of Cover Signals
3(1)
Nature of Content
4(1)
Oblivious and Nonoblivious
4(1)
Synchronous and Asynchronous
4(1)
Active and Passive Wardens
5(1)
Properties of Steganographic Communications
5(3)
Multimedia Data Hiding
6(2)
The Steganographic Channel
8(6)
Frameworks for Data Hiding
Signal Processing Framework
14(1)
Data Hiding from a Communications Perspective
15(2)
Relationship Between Communications and Signal Processing Frameworks
17(3)
A Review of Data Hiding Methods
20(7)
Communication with Side Information and Data Hiding
Costa's Framework
27(3)
A Framework Based on Channel Adaptive Encoding and Channel Independent Decoding
30(5)
Highlights of the CAE-CID Framework
34(1)
On the Duality of Communications and Data Hiding Frameworks
35(5)
Codebook Generation for Data Hiding Methods
40(10)
Type I (Linear) Data Hiding
Linear Data Hiding in Transform Domain
50(1)
Problem Statement
51(1)
Capacity of Additive Noise Channels
52(6)
Modeling Channel Noise
58(3)
Modeling Image Noise
59(1)
Modeling Processing Noise
59(2)
Visual Threshold
61(2)
Channel Capacity vs. Choice of Transform
63(3)
Some Capacity Results and Discussions
66(8)
The Ideal Decomposition
74(2)
Factors Influencing Choice of Transform
76(3)
Type II and Type III (Nonlinear) Data Hiding Methods
Type II Embedding and Detection
79(4)
Type III Embedding and Detection Methods
83(15)
Postprocessing Types
85(1)
Vectoral Embedding and Detection
86(1)
Scalar Embedding and Detection
87(1)
Forms of Demodulation
87(1)
Minimum Distance Decoding
88(2)
Maximum Correlation Rule
90(1)
Optimization Criteria for Embedding and Detection Parameters
91(1)
Optimization of Parameters for Vectoral Embedding and Detection
91(1)
Optimization of Parameters for Scalar Embedding and Detection
92(3)
Maximizing Correlation
95(1)
Minimizing Probability of Error
96(2)
Maximizing Mutual Information
98(1)
Performance Comparisons
98(10)
Advanced Implementations
Spread Transforming
108(5)
Multiple Codebook Data Hiding
113(41)
A Channel Model for Multiple Codebook Data Hiding
119(6)
Single Codebook Data Hiding Based on the Maximum Correlation Criterion
125(2)
Distribution of ρind
127(1)
Distribution of ρdep
128(2)
Multiple Codebook Data Hiding Using the Maximum Correlation Criterion
130(2)
Distribution of ρim, j
132(1)
Distribution of ρmax
133(1)
Single Codebook Hiding Using the Minimum Distance Criterion
134(1)
Distribution of dind
135(1)
Distribution of ddep
136(1)
Multiple Codebook Hiding Using the Minimum Distance Criterion
137(2)
Distribution of dim, j
139(1)
Distribution of dmin
139(1)
Comparisons
139(8)
Implementation and Simulation Results
147(7)
Major Design Issues
DFT-Based Signaling
154(6)
Conventional Signaling
154(1)
FFT-Based Signaling
155(1)
Cyclic All-Pass Sequences
155(2)
Signal Constellation
157(1)
Redundant Signaling
158(2)
Synchronization
160(10)
Autocorrelation for Restoring the Cropped Signal
162(3)
Practical Concerns
165(1)
Watermark Signal Design
165(1)
Cyclic Autocorrelation
165(2)
Synchronization
167(1)
Results
167(3)
Perceptual Constraints
170(2)
Attacks on Data Hiding Systems
172(7)
Removal Attacks
173(1)
Blind Attacks
173(1)
Estimation Attacks
174(1)
Desynchronization Attacks
175(1)
Geometric Attacks
175(1)
Mosaic Attack
175(1)
Template and Periodicity Removal
175(1)
Security/Cryptographic Attacks
176(1)
Protocol Attacks
176(1)
Invertible Watermarks
176(1)
Copy Attack
176(1)
Future Direction in Attack Design
176(3)
Data Hiding Applications
Design of Data Hiding Methods Robust to Lossy Compression
179(15)
Data Hiding for Secure Multimedia Delivery
180(2)
Compression and Data Hiding
182(1)
Data Hiding with Known Compression
183(2)
Simultaneous Robustness to Multiple Compression Techniques
185(2)
Robustness to Unknown Compression Methods
187(1)
Utilizing the ``Hole'' in Compression Techniques
187(4)
The Data Hiding Scheme
191(3)
Type III Hiding for Lossy Compression
194(5)
Joint Embedding and Compression
195(2)
Results for JPEG Compression
197(2)
Watermarking for Ownership
199(22)
Counterfeit Attacks on Watermarks
201(1)
Freedom in Choosing
202(1)
Detection Statistic
203(2)
Fake Originals
205(1)
Multiple Watermarks
205(1)
Watermarking Algorithms
206(1)
Overcoming Attacks on Watermarks
207(2)
Restrictions on Choice of Signature
209(1)
Attacking Scheme III (Craver's Protocol)
210(1)
Quasi-Oblivious Watermarking
211(2)
Detection Statistic for Quasi-Oblivious Watermarking
213(1)
Suggested Protocol
214(2)
An Example of a Watermarking Scheme
216(5)
APPENDIX A CAE-CID Framework under Varying
Channel Noise
221(2)
APPENDIX B Statistics of pdep\P and ddep\P
223(8)
APPENDIX C Mathematical Proofs
C.1 Proof of Eq. (7.7)
229(1)
C.2 Proof of Eq. (7.10)
230(1)
Bibliography 231(8)
Index 239
Ali N. Akansu received the BS degree from the Technical University of Istanbul, Turkey, in 1980, the MS and Ph.D degrees from the Polytechnic University, Brooklyn, New York in 1983 and 1987, respectively, all in Electrical Engineering. He has been with the Electrical & Computer Engineering Department of the New Jersey Institute of Technology since 1987. He was an academic visitor at David Sarnoff Research Center, at IBM T.J. Watson Research Center, and at GEC-Marconi Electronic Systems Corp. He was a Visiting Professor at Courant Institute of Mathematical Sciences of the New York University performed research on Quantitative Finance. He serves as a consultant to the industry. His current research and professional interests include theory of signals and transforms, financial engineering & electronic trading, and high performance DSP (FPGA & GPU computing).