|
1 Preliminary on Watermarking Technology |
|
|
1 | (16) |
|
|
1 | (1) |
|
1.2 Fundamentals of Digital Watermarking |
|
|
2 | (1) |
|
1.3 Requirements of Digital Watermarking |
|
|
3 | (5) |
|
1.3.1 Robustness of Digital Watermarking |
|
|
4 | (1) |
|
1.3.2 Capacity of Digital Watermarking |
|
|
5 | (1) |
|
1.3.3 Imperceptibility of Digital Watermarking |
|
|
5 | (2) |
|
|
7 | (1) |
|
|
7 | (1) |
|
1.3.6 False Positive Rate |
|
|
8 | (1) |
|
1.3.7 False Negative Rate |
|
|
8 | (1) |
|
|
8 | (1) |
|
1.5 Applications of Digital Watermarking |
|
|
9 | (2) |
|
|
11 | (2) |
|
|
13 | (4) |
Part I Signal Watermarking |
|
|
|
17 | (22) |
|
|
17 | (1) |
|
|
17 | (2) |
|
2.3 Audio Watermarking Techniques |
|
|
19 | (8) |
|
|
20 | (2) |
|
|
22 | (4) |
|
|
26 | (1) |
|
|
27 | (2) |
|
2.4.1 Embedding Before Encoding (Pre-encoding) |
|
|
28 | (1) |
|
2.4.2 Embedding During Encoding (in-Encoder) |
|
|
28 | (1) |
|
2.4.3 Embedding After Encoding (Post-encoder) |
|
|
29 | (1) |
|
|
29 | (7) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
2.5.8 Time Stretch and Pitch Shift |
|
|
32 | (1) |
|
2.5.9 Sample Permutations |
|
|
32 | (4) |
|
2.6 Comparison Among Different Audio Watermarking Methods |
|
|
36 | (1) |
|
|
36 | (3) |
|
|
39 | (18) |
|
|
39 | (1) |
|
|
40 | (1) |
|
3.3 Linear Predictive Analysis (LPA) |
|
|
40 | (2) |
|
3.4 Speech Watermarking Techniques |
|
|
42 | (6) |
|
3.4.1 Speech Watermarking Based on Auditory Masking |
|
|
42 | (1) |
|
3.4.2 Speech Watermarking Based on Phase Modulation |
|
|
43 | (2) |
|
3.4.3 Speech Watermarking Based on Quantization |
|
|
45 | (1) |
|
3.4.4 Speech Watermarking Based on Transformation |
|
|
46 | (2) |
|
3.4.5 Speech Watermarking Based on Parametric Modeling |
|
|
48 | (1) |
|
3.5 Attacks for Speech Watermarking |
|
|
48 | (2) |
|
3.5.1 Additive White Gaussian Noise (AWGN) |
|
|
48 | (1) |
|
3.5.2 Low-Pass Filter (LPF) |
|
|
49 | (1) |
|
3.5.3 Band-Pass Filter (BPF) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
3.5.7 Amplitude Variation |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
3.6 Challenges in Speech Watermarking |
|
|
50 | (1) |
|
|
51 | (6) |
Part II Multimedia Watermarking |
|
|
|
57 | (10) |
|
|
57 | (1) |
|
|
57 | (1) |
|
4.3 Image Watermarking Techniques |
|
|
58 | (4) |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (2) |
|
4.5 Challenges in Image Watermarking |
|
|
64 | (1) |
|
4.6 Image Watermarking Based on Human Visual System |
|
|
64 | (1) |
|
4.7 Medical Image Watermarking |
|
|
65 | (1) |
|
|
65 | (2) |
|
|
67 | (14) |
|
|
67 | (1) |
|
|
67 | (2) |
|
5.3 Video Watermarking Techniques |
|
|
69 | (4) |
|
5.3.1 Image-Based Video Watermarking |
|
|
69 | (3) |
|
5.3.2 Video-Based Video Watermarking |
|
|
72 | (1) |
|
5.4 Video Watermarking Attacks |
|
|
73 | (3) |
|
5.4.1 Temporal Frame Averaging (TFA) |
|
|
74 | (1) |
|
5.4.2 Watermark Estimation Remodulation (WER) |
|
|
74 | (1) |
|
5.4.3 Watermark Estimations Clustering and Remodulation (WECR) |
|
|
74 | (1) |
|
5.4.4 Watermarking Subspace Estimation Draining (WSED) |
|
|
74 | (1) |
|
5.4.5 Block Replacement (BR) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
5.5 Video-Enforced Strategies |
|
|
76 | (2) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
5.6 Critical Review in Video Watermarking |
|
|
78 | (1) |
|
|
79 | (2) |
|
6 Three-Dimensional (3D) Watermarking |
|
|
81 | (22) |
|
|
81 | (1) |
|
6.2 3D Modeling Representation |
|
|
82 | (1) |
|
6.3 Background of 3D Watermarking |
|
|
83 | (2) |
|
6.4 Attacks in 3D Watermarking |
|
|
85 | (1) |
|
6.5 Techniques in 3D Watermarking |
|
|
86 | (9) |
|
6.5.1 Fragile 3D Watermarking |
|
|
86 | (4) |
|
6.5.2 Robust 3D Watermarking |
|
|
90 | (5) |
|
6.6 Distortion Evaluation in 3D Watermarking |
|
|
95 | (1) |
|
|
96 | (7) |
Part III Document Watermarking |
|
|
7 Natural Language Watermarking |
|
|
103 | (18) |
|
|
103 | (1) |
|
7.2 Background of Natural Language Processing |
|
|
103 | (6) |
|
|
104 | (1) |
|
7.2.2 Linguistic Transformations |
|
|
104 | (2) |
|
7.2.3 Natural Language Parsing |
|
|
106 | (1) |
|
7.2.4 Word Sense Disambiguation |
|
|
107 | (1) |
|
7.2.5 Statistical Language Models |
|
|
107 | (1) |
|
7.2.6 Natural Language Generation |
|
|
108 | (1) |
|
7.2.7 Natural Language Paraphrasing |
|
|
108 | (1) |
|
7.3 Natural Language Watermarking |
|
|
109 | (8) |
|
7.3.1 Requirements of NL Watermarking |
|
|
109 | (4) |
|
7.3.2 Natural Language Watermarking Techniques |
|
|
113 | (4) |
|
7.4 NL Watermarking Versus Text Watermarking |
|
|
117 | (1) |
|
|
118 | (3) |
|
|
121 | (10) |
|
|
121 | (1) |
|
8.2 Background of Text Watermarking |
|
|
121 | (1) |
|
8.3 Attacks in Text Watermarking |
|
|
122 | (1) |
|
8.4 Text Watermarking Robustness |
|
|
123 | (1) |
|
8.5 Text Watermarking Techniques |
|
|
123 | (4) |
|
8.5.1 Image-Based Approach |
|
|
124 | (1) |
|
|
124 | (2) |
|
|
126 | (1) |
|
8.5.4 Structural Approach |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
131 | (14) |
|
|
131 | (1) |
|
9.2 Background of Software Watermarking |
|
|
131 | (2) |
|
9.3 Formal Representation of Software Watermarking |
|
|
133 | (2) |
|
9.4 Software Watermarking Criteria |
|
|
135 | (2) |
|
9.5 Software Watermarking Techniques |
|
|
137 | (4) |
|
9.5.1 Basic Blocking Reordering Technique |
|
|
138 | (1) |
|
9.5.2 Register Allocation Technique |
|
|
138 | (1) |
|
9.5.3 Spread Spectrum Technique |
|
|
138 | (1) |
|
9.5.4 Opaque Predicate Technique |
|
|
139 | (1) |
|
9.5.5 Threading Technique |
|
|
139 | (1) |
|
9.5.6 Abstract Interpretation Technique |
|
|
139 | (1) |
|
9.5.7 Metamorphic Technique |
|
|
139 | (1) |
|
9.5.8 Dynamic Path Technique |
|
|
140 | (1) |
|
9.5.9 Mobile Agent Technique |
|
|
140 | (1) |
|
9.5.10 Graph-Based Technique |
|
|
140 | (1) |
|
9.5.11 Birthmarks Technique |
|
|
141 | (1) |
|
9.6 Attacks in Software Watermarking |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
|
10 Relational Database, XML, and Ontology Watermarking |
|
|
145 | (20) |
|
|
145 | (1) |
|
10.2 Issues in Relational Database Watermarking |
|
|
146 | (1) |
|
10.3 Database Watermarking Attacks |
|
|
147 | (1) |
|
10.4 Database Watermarking Techniques |
|
|
148 | (4) |
|
10.4.1 Distortion-Based Watermarking |
|
|
148 | (2) |
|
10.4.2 Distortion-Free Watermarking |
|
|
150 | (2) |
|
10.5 Types of Digital Watermark |
|
|
152 | (2) |
|
10.5.1 Arbitrary Meaningless Bit Pattern |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
10.5.4 Content Characteristics |
|
|
153 | (1) |
|
|
153 | (1) |
|
10.5.6 Meaningful Information |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
10.6 Extension of Database Watermarking to XML Watermarking |
|
|
154 | (1) |
|
10.7 Preliminary in XML Data |
|
|
155 | (1) |
|
|
155 | (2) |
|
10.8.1 Query-Based XML Watermarking |
|
|
156 | (1) |
|
10.8.2 Fuzzy Queries XML Watermarking |
|
|
157 | (1) |
|
10.9 XML Watermarking Attacks |
|
|
157 | (2) |
|
10.10 Extension of Database Watermarking to Ontology Watermarking |
|
|
159 | (1) |
|
10.11 Ontology Watermarking |
|
|
159 | (1) |
|
|
160 | (5) |
Part IV Advance in Watermarking |
|
|
11 Network Stream Watermarking |
|
|
165 | (16) |
|
|
165 | (1) |
|
11.2 Network Traffic Modeling |
|
|
166 | (1) |
|
11.3 Network Watermark Properties |
|
|
166 | (2) |
|
11.4 Network Watermarking Techniques |
|
|
168 | (5) |
|
11.4.1 Network Flow Watermarking |
|
|
168 | (1) |
|
11.4.2 Watermarks in Anonymous Systems |
|
|
169 | (1) |
|
11.4.3 Watermarks in Stepping Stones |
|
|
170 | (1) |
|
11.4.4 Interval Centroid-Based Watermarking |
|
|
170 | (1) |
|
11.4.5 Interval-Based Watermarking |
|
|
171 | (1) |
|
11.4.6 Spread-Spectrum Watermarking |
|
|
172 | (1) |
|
11.5 Network Watermarking Attacks |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
11.5.4 Packet Modification Attack |
|
|
174 | (1) |
|
11.6 Watermarking Strategy |
|
|
174 | (1) |
|
11.6.1 Single-Message Watermarks |
|
|
174 | (1) |
|
11.6.2 Multi-message Watermarks |
|
|
174 | (1) |
|
|
174 | (1) |
|
11.7 Types of Adversaries |
|
|
175 | (3) |
|
11.7.1 Invisibility with Isolated Adversaries |
|
|
176 | (1) |
|
11.7.2 Invisibility with Chosen Flow Adversaries |
|
|
177 | (1) |
|
|
178 | (3) |
|
12 Hardware IP Watermarking |
|
|
181 | (10) |
|
|
181 | (1) |
|
12.2 Background of SOC Design Flow |
|
|
182 | (1) |
|
12.3 Reusable and Deliverable IP Blocks |
|
|
183 | (1) |
|
12.4 Hardware IP Watermarking Techniques |
|
|
184 | (3) |
|
12.4.1 Dynamic IP Watermarking Technique |
|
|
184 | (2) |
|
12.4.2 Static IP Watermarking Technique |
|
|
186 | (1) |
|
12.4.3 Hierarchical IP Watermarking Technique |
|
|
187 | (1) |
|
12.5 Attack on IP Watermarking |
|
|
187 | (1) |
|
12.6 Criterion in IP Watermarking |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (2) |
|
13 Security Enhancement of Digital Watermarking |
|
|
191 | |
|
|
191 | (1) |
|
13.2 Digital Watermarking Application Scenarios for Online Biometric Recognition Systems |
|
|
191 | (3) |
|
13.2.1 Stenographic (Covert) Communication |
|
|
192 | (1) |
|
13.2.2 Multi-biometric Recognition |
|
|
193 | (1) |
|
13.2.3 Multi-factor Authentication (MFA) |
|
|
193 | (1) |
|
13.2.4 Sample Replay Prevention |
|
|
193 | (1) |
|
13.2.5 Sample Authentication |
|
|
194 | (1) |
|
13.3 Biometric Watermarking |
|
|
194 | (1) |
|
13.4 Quantum Watermarking |
|
|
195 | (3) |
|
|
198 | (1) |
|
13.6 Application of Watermarking in Financial Systems |
|
|
199 | (1) |
|
13.7 Robustness Versus Security |
|
|
199 | (2) |
|
|
201 | |