Preface |
|
ix | |
Authors |
|
xi | |
Abbreviations |
|
xiii | |
|
|
1 | (24) |
|
1.1 Digital Rights Management |
|
|
2 | (2) |
|
1.2 Digital Image Watermarking |
|
|
4 | (1) |
|
1.3 Classification of Copyright Marking |
|
|
5 | (6) |
|
1.4 General Framework of Digital Watermarking |
|
|
11 | (1) |
|
|
12 | (3) |
|
|
15 | (1) |
|
1.7 Attacks on Watermarks |
|
|
16 | (3) |
|
1.8 Digital Image Watermarking Tools |
|
|
19 | (6) |
|
|
22 | (3) |
|
Chapter 2 Advanced Watermarking Techniques |
|
|
25 | (46) |
|
|
26 | (2) |
|
2.2 Watermarking in the Spatial Domain |
|
|
28 | (5) |
|
2.2.1 Least-Significant-Bit Substitution Technique |
|
|
29 | (1) |
|
2.2.2 Patchwork Technique |
|
|
29 | (1) |
|
2.2.3 Texture Mapping Coding Technique |
|
|
30 | (1) |
|
2.2.4 Predictive Coding Technique |
|
|
30 | (1) |
|
2.2.5 Additive Watermarking Technique |
|
|
31 | (1) |
|
2.2.6 Other Spatial Domain Watermarking Techniques |
|
|
32 | (1) |
|
2.3 Watermarking In The Transform Domain |
|
|
33 | (1) |
|
2.4 Watermarking In The Discrete Cosine Transform |
|
|
34 | (3) |
|
2.5 Watermarking In The Discrete Wavelet Transform |
|
|
37 | (1) |
|
2.6 Watermarking Using Singular Value Decomposition |
|
|
38 | (2) |
|
2.7 Compressive Sensing And Qr Decomposition Methods |
|
|
40 | (1) |
|
2.8 Schur Decomposition-Based Watermarking |
|
|
41 | (1) |
|
2.9 Hessenberg Matrix Factorization In Watermarking |
|
|
41 | (1) |
|
2.10 Visible And Reversible Watermarking |
|
|
42 | (2) |
|
2.11 Machine Learning-Based Image Watermarking |
|
|
44 | (13) |
|
|
57 | (14) |
|
|
57 | (14) |
|
Chapter 3 Watermarking Using Bio-Inspired Algorithms |
|
|
71 | (36) |
|
3.1 Optimization And Its Application To Digital Image Watermarking |
|
|
72 | (2) |
|
3.2 Image Watermarking Using Genetic Algorithm (Ga) And Genetic Programming |
|
|
74 | (6) |
|
3.3 Image Watermarking Using Differential Evolution (De) |
|
|
80 | (1) |
|
3.4 Image Watermarking Using Swarm Algorithms |
|
|
81 | (4) |
|
3.4.1 Image Watermarking Using Ant Colony And Bee Colony |
|
|
84 | (1) |
|
3.4.2 Image Watermarking Using Cuckoo Search Algorithm |
|
|
85 | (12) |
|
3.4.3 Image Watermarking Using Particle Swarm Optimization |
|
|
88 | (2) |
|
3.4.4 Image Watermarking Using Firefly Algorithm |
|
|
90 | (7) |
|
3.5 Image Watermarking Using Simulated Annealing (Sa) |
|
|
97 | (1) |
|
3.6 Image Watermarking Using Tabu Search |
|
|
98 | (9) |
|
|
99 | (8) |
|
Chapter 4 Hardware-Based Implementation Of Watermarking |
|
|
107 | (26) |
|
|
108 | (1) |
|
4.2 Hardware-Based Implementation Of Digital Image Watermarking |
|
|
109 | (7) |
|
4.2.1 Hardware-Based Implementation Of Watermarking Using Dsp Boards |
|
|
111 | (1) |
|
4.2.2 Hardware-Based Implementation Of Watermarking Using Fpga/Asic Chip |
|
|
112 | (1) |
|
4.2.3 Hardware-Software Co-Simulation |
|
|
113 | (3) |
|
4.3 Performance Of Hardware-Based Implementation |
|
|
116 | (10) |
|
4.4 Challenges And Future Directions |
|
|
126 | (7) |
|
|
127 | (6) |
|
Chapter 5 Applied Examples And Future Prospectives |
|
|
133 | (10) |
|
5.1 Applications Of Watermarking |
|
|
134 | (2) |
|
5.2 Watermarking In Telemedicine |
|
|
136 | (1) |
|
5.3 Role Of Watermarking In Remote-Sensing Military |
|
|
137 | (2) |
|
5.4 Industrial And Miscellaneous Applications |
|
|
139 | (1) |
|
|
139 | (4) |
|
|
141 | (2) |
|
|
143 | (14) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
147 | (2) |
|
6.4 Main Features Of Proposed Scheme |
|
|
149 | (8) |
|
|
154 | (3) |
Index |
|
157 | |