Muutke küpsiste eelistusi

Digital Watermarking: Techniques and Trends 1st ed. 2017 [Kõva köide]

  • Formaat: Hardback, 203 pages, kõrgus x laius: 235x155 mm, kaal: 4734 g, 13 Illustrations, color; 29 Illustrations, black and white; XXV, 203 p. 42 illus., 13 illus. in color., 1 Hardback
  • Sari: Springer Topics in Signal Processing 11
  • Ilmumisaeg: 19-Aug-2016
  • Kirjastus: Springer Verlag, Singapore
  • ISBN-10: 9811020949
  • ISBN-13: 9789811020940
  • Kõva köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 203 pages, kõrgus x laius: 235x155 mm, kaal: 4734 g, 13 Illustrations, color; 29 Illustrations, black and white; XXV, 203 p. 42 illus., 13 illus. in color., 1 Hardback
  • Sari: Springer Topics in Signal Processing 11
  • Ilmumisaeg: 19-Aug-2016
  • Kirjastus: Springer Verlag, Singapore
  • ISBN-10: 9811020949
  • ISBN-13: 9789811020940
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field.





Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

Arvustused

This book introduces many watermarking techniques, applied to a wide range of media, and discusses the tradeoffs between different techniques. it will serve as a great introductory resource for anyone (both researchers and practitioners) who is a beginner in this field and wants to familiarize themselves with the available techniques. Each chapter has an extensive references section that can then be used as a guide for more in-depth study. (Andrew Kalafut, Computing Reviews, January, 2017)

1 Preliminary on Watermarking Technology
1(16)
1.1 Overview
1(1)
1.2 Fundamentals of Digital Watermarking
2(1)
1.3 Requirements of Digital Watermarking
3(5)
1.3.1 Robustness of Digital Watermarking
4(1)
1.3.2 Capacity of Digital Watermarking
5(1)
1.3.3 Imperceptibility of Digital Watermarking
5(2)
1.3.4 Tamper Resistance
7(1)
1.3.5 Computational Cost
7(1)
1.3.6 False Positive Rate
8(1)
1.3.7 False Negative Rate
8(1)
1.4 Zero Watermarking
8(1)
1.5 Applications of Digital Watermarking
9(2)
1.6 Book Structure
11(2)
References
13(4)
Part I Signal Watermarking
2 Audio Watermarking
17(22)
2.1 Introduction
17(1)
2.2 Transmission Channel
17(2)
2.3 Audio Watermarking Techniques
19(8)
2.3.1 Temporal Domain
20(2)
2.3.2 Frequency Domain
22(4)
2.3.3 Coded Domain
26(1)
2.4 Embedding Approach
27(2)
2.4.1 Embedding Before Encoding (Pre-encoding)
28(1)
2.4.2 Embedding During Encoding (in-Encoder)
28(1)
2.4.3 Embedding After Encoding (Post-encoder)
29(1)
2.5 Audio Attacks
29(7)
2.5.1 Dynamics
29(1)
2.5.2 Filter
30(1)
2.5.3 Ambience
31(1)
2.5.4 Conversion
31(1)
2.5.5 Loss Compression
31(1)
2.5.6 Noise
31(1)
2.5.7 Modulation
32(1)
2.5.8 Time Stretch and Pitch Shift
32(1)
2.5.9 Sample Permutations
32(4)
2.6 Comparison Among Different Audio Watermarking Methods
36(1)
References
36(3)
3 Speech Watermarking
39(18)
3.1 Introduction
39(1)
3.2 Speech Versus Audio
40(1)
3.3 Linear Predictive Analysis (LPA)
40(2)
3.4 Speech Watermarking Techniques
42(6)
3.4.1 Speech Watermarking Based on Auditory Masking
42(1)
3.4.2 Speech Watermarking Based on Phase Modulation
43(2)
3.4.3 Speech Watermarking Based on Quantization
45(1)
3.4.4 Speech Watermarking Based on Transformation
46(2)
3.4.5 Speech Watermarking Based on Parametric Modeling
48(1)
3.5 Attacks for Speech Watermarking
48(2)
3.5.1 Additive White Gaussian Noise (AWGN)
48(1)
3.5.2 Low-Pass Filter (LPF)
49(1)
3.5.3 Band-Pass Filter (BPF)
49(1)
3.5.4 A-Law
49(1)
3.5.5 µ-Law
50(1)
3.5.6 CELP
50(1)
3.5.7 Amplitude Variation
50(1)
3.5.8 Resample
50(1)
3.5.9 Requantization
50(1)
3.6 Challenges in Speech Watermarking
50(1)
References
51(6)
Part II Multimedia Watermarking
4 Image Watermarking
57(10)
4.1 Introduction
57(1)
4.2 Background
57(1)
4.3 Image Watermarking Techniques
58(4)
4.3.1 Spatial Domain
58(2)
4.3.2 Transform Domain
60(1)
4.3.3 Multiple Domains
61(1)
4.4 Image Attacks
62(2)
4.5 Challenges in Image Watermarking
64(1)
4.6 Image Watermarking Based on Human Visual System
64(1)
4.7 Medical Image Watermarking
65(1)
References
65(2)
5 Video Watermarking
67(14)
5.1 Introduction
67(1)
5.2 Background of Video
67(2)
5.3 Video Watermarking Techniques
69(4)
5.3.1 Image-Based Video Watermarking
69(3)
5.3.2 Video-Based Video Watermarking
72(1)
5.4 Video Watermarking Attacks
73(3)
5.4.1 Temporal Frame Averaging (TFA)
74(1)
5.4.2 Watermark Estimation Remodulation (WER)
74(1)
5.4.3 Watermark Estimations Clustering and Remodulation (WECR)
74(1)
5.4.4 Watermarking Subspace Estimation Draining (WSED)
74(1)
5.4.5 Block Replacement (BR)
74(1)
5.4.6 Block Combination
75(1)
5.4.7 Block Projection
75(1)
5.4.8 Block Restoration
75(1)
5.4.9 Block Swapping
76(1)
5.5 Video-Enforced Strategies
76(2)
5.5.1 SS System
76(1)
5.5.2 SS-1 System
76(1)
5.5.3 SS-N System
77(1)
5.5.4 SS-α System
77(1)
5.5.5 Discussion
77(1)
5.6 Critical Review in Video Watermarking
78(1)
References
79(2)
6 Three-Dimensional (3D) Watermarking
81(22)
6.1 Introduction
81(1)
6.2 3D Modeling Representation
82(1)
6.3 Background of 3D Watermarking
83(2)
6.4 Attacks in 3D Watermarking
85(1)
6.5 Techniques in 3D Watermarking
86(9)
6.5.1 Fragile 3D Watermarking
86(4)
6.5.2 Robust 3D Watermarking
90(5)
6.6 Distortion Evaluation in 3D Watermarking
95(1)
References
96(7)
Part III Document Watermarking
7 Natural Language Watermarking
103(18)
7.1 Introduction
103(1)
7.2 Background of Natural Language Processing
103(6)
7.2.1 Data Resources
104(1)
7.2.2 Linguistic Transformations
104(2)
7.2.3 Natural Language Parsing
106(1)
7.2.4 Word Sense Disambiguation
107(1)
7.2.5 Statistical Language Models
107(1)
7.2.6 Natural Language Generation
108(1)
7.2.7 Natural Language Paraphrasing
108(1)
7.3 Natural Language Watermarking
109(8)
7.3.1 Requirements of NL Watermarking
109(4)
7.3.2 Natural Language Watermarking Techniques
113(4)
7.4 NL Watermarking Versus Text Watermarking
117(1)
References
118(3)
8 Text Watermarking
121(10)
8.1 Introduction
121(1)
8.2 Background of Text Watermarking
121(1)
8.3 Attacks in Text Watermarking
122(1)
8.4 Text Watermarking Robustness
123(1)
8.5 Text Watermarking Techniques
123(4)
8.5.1 Image-Based Approach
124(1)
8.5.2 Syntactic Approach
124(2)
8.5.3 Semantic Approach
126(1)
8.5.4 Structural Approach
126(1)
8.5.5 Hybrid Approach
127(1)
8.6 Discussion
127(1)
8.7 Summary
128(1)
References
128(3)
9 Software Watermarking
131(14)
9.1 Introduction
131(1)
9.2 Background of Software Watermarking
131(2)
9.3 Formal Representation of Software Watermarking
133(2)
9.4 Software Watermarking Criteria
135(2)
9.5 Software Watermarking Techniques
137(4)
9.5.1 Basic Blocking Reordering Technique
138(1)
9.5.2 Register Allocation Technique
138(1)
9.5.3 Spread Spectrum Technique
138(1)
9.5.4 Opaque Predicate Technique
139(1)
9.5.5 Threading Technique
139(1)
9.5.6 Abstract Interpretation Technique
139(1)
9.5.7 Metamorphic Technique
139(1)
9.5.8 Dynamic Path Technique
140(1)
9.5.9 Mobile Agent Technique
140(1)
9.5.10 Graph-Based Technique
140(1)
9.5.11 Birthmarks Technique
141(1)
9.6 Attacks in Software Watermarking
141(1)
9.7 Discussion
142(1)
References
143(2)
10 Relational Database, XML, and Ontology Watermarking
145(20)
10.1 Introduction
145(1)
10.2 Issues in Relational Database Watermarking
146(1)
10.3 Database Watermarking Attacks
147(1)
10.4 Database Watermarking Techniques
148(4)
10.4.1 Distortion-Based Watermarking
148(2)
10.4.2 Distortion-Free Watermarking
150(2)
10.5 Types of Digital Watermark
152(2)
10.5.1 Arbitrary Meaningless Bit Pattern
152(1)
10.5.2 Image
153(1)
10.5.3 Speech
153(1)
10.5.4 Content Characteristics
153(1)
10.5.5 Cloud Model
153(1)
10.5.6 Meaningful Information
154(1)
10.5.7 Fake Tuples
154(1)
10.5.8 Virtual Attribute
154(1)
10.6 Extension of Database Watermarking to XML Watermarking
154(1)
10.7 Preliminary in XML Data
155(1)
10.8 XML Watermarking
155(2)
10.8.1 Query-Based XML Watermarking
156(1)
10.8.2 Fuzzy Queries XML Watermarking
157(1)
10.9 XML Watermarking Attacks
157(2)
10.10 Extension of Database Watermarking to Ontology Watermarking
159(1)
10.11 Ontology Watermarking
159(1)
References
160(5)
Part IV Advance in Watermarking
11 Network Stream Watermarking
165(16)
11.1 Introduction
165(1)
11.2 Network Traffic Modeling
166(1)
11.3 Network Watermark Properties
166(2)
11.4 Network Watermarking Techniques
168(5)
11.4.1 Network Flow Watermarking
168(1)
11.4.2 Watermarks in Anonymous Systems
169(1)
11.4.3 Watermarks in Stepping Stones
170(1)
11.4.4 Interval Centroid-Based Watermarking
170(1)
11.4.5 Interval-Based Watermarking
171(1)
11.4.6 Spread-Spectrum Watermarking
172(1)
11.5 Network Watermarking Attacks
173(1)
11.5.1 Active Attack
173(1)
11.5.2 Copy Attack
173(1)
11.5.3 Ambiguity Attacks
173(1)
11.5.4 Packet Modification Attack
174(1)
11.6 Watermarking Strategy
174(1)
11.6.1 Single-Message Watermarks
174(1)
11.6.2 Multi-message Watermarks
174(1)
11.6.3 Multiple Messages
174(1)
11.7 Types of Adversaries
175(3)
11.7.1 Invisibility with Isolated Adversaries
176(1)
11.7.2 Invisibility with Chosen Flow Adversaries
177(1)
References
178(3)
12 Hardware IP Watermarking
181(10)
12.1 Introduction
181(1)
12.2 Background of SOC Design Flow
182(1)
12.3 Reusable and Deliverable IP Blocks
183(1)
12.4 Hardware IP Watermarking Techniques
184(3)
12.4.1 Dynamic IP Watermarking Technique
184(2)
12.4.2 Static IP Watermarking Technique
186(1)
12.4.3 Hierarchical IP Watermarking Technique
187(1)
12.5 Attack on IP Watermarking
187(1)
12.6 Criterion in IP Watermarking
187(1)
12.7 Discussion
188(1)
References
189(2)
13 Security Enhancement of Digital Watermarking
191
13.1 Introduction
191(1)
13.2 Digital Watermarking Application Scenarios for Online Biometric Recognition Systems
191(3)
13.2.1 Stenographic (Covert) Communication
192(1)
13.2.2 Multi-biometric Recognition
193(1)
13.2.3 Multi-factor Authentication (MFA)
193(1)
13.2.4 Sample Replay Prevention
193(1)
13.2.5 Sample Authentication
194(1)
13.3 Biometric Watermarking
194(1)
13.4 Quantum Watermarking
195(3)
13.5 DNA Watermarking
198(1)
13.6 Application of Watermarking in Financial Systems
199(1)
13.7 Robustness Versus Security
199(2)
References
201
Dr. Mohammad Ali Nematollahi was born in 1986 in Shiraz, Iran. He received his B.S. in computer engineering (software) from Yazd University, Iran in 2008. He completed his master's degree in computer engineering (software) at the Islamic Azad University (IAU), Dubai, UAE in 2011, where he was also a lecturer from 2010 to 2011. He holds a Ph.D in computer and embedded systems engineering from Universiti Putra Malaysia (UPM). He has published numerous articles in international journals. His research interests include digital signal processing, speaker recognition and digital watermarking.





Dr. Chalee Vorakulpipat received his B.Eng. in electronics engineering from King Mongkuts Institute of Technology Ladkrabang in Thailand and his M.S. in information technology from Kasetsart University in Thailand. He was awarded a scholarship from the Royal Thai Government to pursue a doctoral study. He earned his PhD in information systems from the University of Salford, UK. He is currently a senior researcher and head of the Cybersecurity Laboratory at the National Electronics and Computer Technology Center of Thailand. He has been involved in several projects in information security, mobile device management, social networking sites, ubiquitous computing, context-aware computing, e-health and mobile application development. He has written over 30 refereed publications in these areas, which have appeared in conference proceedings and journals such as Computers & Security, Advanced Engineering Informatics, Automation in Construction, Knowledge Engineering Review, and ETRI Journal. He also serves on the National Information Security of Thailand subcommittee. He also works as a lecturer for information systems courses at several universities in Thailand. He holds information security professional certificates including CISSP, CISA and IRCA:ISMS Lead Auditor, and a project management professional certificate - PMP.





Dr. Hamurabi Gamboa Rosales received his bachelors degree in electronics and communications engineering from the Faculty of Engineering at the University of Guadalajaras in 2000. From 2001 to 2003, he completed his masters degree in electrical engineering, focusing on digital signal processing, at the University of Guanajuato. He completed his doctoral studies in the area of voice processing at the Technical University of Dresden, Germany in 2010. He currently works as a professor and researcher in the area of research digital signal processing at the Academic Unit of Electrical Engineering of the Autonomous University of Zacatecas, Mexico.