LEADER 05607nam 22007214a 450 001 9910777307303321 005 20200520144314.0 010 $a1-281-09616-4 010 $a9786611096168 010 $a0-08-055580-2 035 $a(CKB)1000000000413987 035 $a(EBL)328311 035 $a(OCoLC)227968408 035 $a(SSID)ssj0000139251 035 $a(PQKBManifestationID)11147728 035 $a(PQKBTitleCode)TC0000139251 035 $a(PQKBWorkID)10008230 035 $a(PQKB)10450039 035 $a(Au-PeEL)EBL328311 035 $a(CaPaEBR)ebr10204371 035 $a(CaONFJC)MIL109616 035 $a(OCoLC)190760116 035 $a(MiAaPQ)EBC328311 035 $a(EXLCZ)991000000000413987 100 $a20071001d2008 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aDigital watermarking and steganography$b[electronic resource] /$fIngemar J. Cox ... [et al.] 205 $a2nd ed. 210 $aAmsterdam ;$aBoston $cMorgan Kaufmann Publishers$dc2008 215 $a1 online resource (623 p.) 225 1 $aThe Morgan Kaufmann series in multimedia information and systems 225 1 $aThe Morgan kaufmann series in computer security 300 $aPrev. ed. entered under Cox. 311 $a0-12-372585-2 320 $aIncludes bibliographical references (p. 549-574) and index. 327 $aFront Cover; Digital Watermarking and Steganography; Copyright Page; Table of Contents; Preface to the First Edition; Preface to the Second Edition; Example Watermarking Systems; Chapter 1. Introduction; 1.1 Information Hiding, Steganography, and Watermarking; 1.2 History of Watermarking; 1.3 History of Steganography; 1.4 Importance of Digital Watermarking; 1.5 Importance of Steganography; Chapter 2. Applications and Properties; 2.1 Applications of Watermarking; 2.2 Applications of Steganography; 2.3 Properties of Watermarking Systems; 2.4 Evaluating Watermarking Systems 327 $a2.5 Properties of Steganographic and Steganalysis Systems2.6 Evaluating and Testing Steganographic Systems; 2.7 Summary; Chapter 3. Models of Watermarking; 3.1 Notation; 3.2 Communications; 3.3 Communication-Based Models of Watermarking; 3.4 Geometric Models of Watermarking; 3.5 Modeling Watermark Detection by Correlation; 3.6 Summary; Chapter 4. Basic Message Coding; 4.1 Mapping Messages into Message Vectors; 4.2 Error Correction Coding; 4.3 Detecting Multisymbol Watermarks; 4.4 Summary; Chapter 5. Watermarking with Side Information; 5.1 Informed Embedding 327 $a5.2 Watermarking Using Side Information5.3 Dirty-Paper Codes; 5.4 Summary; Chapter 6. Practical Dirty-Paper Codes; 6.1 Practical Considerations for Dirty-Paper Codes; 6.2 Broad Approaches to Dirty-Paper Code Design; 6.3 Implementing DM with A Simple Lattice Code; 6.4 Typical Tricks in Implementing Lattice Codes; 6.5 Coding with Better Lattices; 6.6 Making Lattice Codes Survive Valumetric Scaling; 6.7 Dirty-Paper Trellis Codes; 6.8 Summary; Chapter 7. Analyzing Errors; 7.1 Message Errors; 7.2 False Positive Errors; 7.3 False Negative Errors; 7.4 ROC Curves 327 $a7.5 The Effect of Whitening on Error Rates7.6 Analysis of Normalized Correlation; 7.7 Summary; Chapter 8. Using Perceptual Models; 8.1 Evaluating Perceptual Impact of Watermarks; 8.2 General Form of A Perceptual Model; 8.3 Two Examples of Perceptual Models; 8.4 Perceptually Adaptive Watermarking; 8.5 Summary; Chapter 9. Robust Watermarking; 9.1 Approaches; 9.2 Robustness to Valumetric Distortions; 9.3 Robustness to Temporal and Geometric Distortions; 9.4 Summary; Chapter 10. Watermark Security; 10.1 Security Requirements; 10.2 Watermark Security and Cryptography 327 $a10.3 Some Significant Known Attacks10.4 Summary; Chapter 11. Content Authentication; 11.1 Exact Authentication; 11.2 Selective Authentication; 11.3 Localization; 11.4 Restoration; 11.5 Summary; Chapter 12. Steganography; 12.1 Steganographic Communication; 12.2 Notation and Terminology; 12.3 Information-Theoretic Foundations of Steganography; 12.4 Practical Steganographic Methods; 12.5 Minimizing the Embedding Impact; 12.6 Summary; Chapter 13. Steganalysis; 13.1 Steganalysis Scenarios; 13.2 Some Significant Steganalysis Algorithms; 13.3 Summary; Appendix A. Background Concepts 327 $aA.1 Information Theory 330 $aDigital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition 410 0$aMorgan Kaufmann series in multimedia information and systems. 410 0$aMorgan Kaufmann series in computer security. 606 $aComputer security 606 $aDigital watermarking 606 $aData protection 615 0$aComputer security. 615 0$aDigital watermarking. 615 0$aData protection. 676 $a005.8 701 $aCox$b I. J$g(Ingemar J.)$0627536 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910777307303321 996 $aDigital watermarking and steganography$93700038 997 $aUNINA