Loading...
Reversible digital watermarking : theory and practices /
Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintai...
Main Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Morgan & Claypool,
2014.
|
Series: | Synthesis digital library of engineering and computer science.
Synthesis lectures on information security, privacy, and trust ; # 10. |
Subjects: | |
Online Access: | Abstract with links to full text |
LEADER | 06917nam a2200697 i 4500 | ||
---|---|---|---|
001 | 201401SPT010 | ||
005 | 20160320103535.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 140315s2014 caua foab 000 0 eng d | ||
020 | |a 9781627053167 |q ebook | ||
020 | |z 9781627053150 |q paperback | ||
024 | 7 | |a 10.2200/S00567ED1V01Y201401SPT010 |2 doi | |
035 | |a (CaBNVSL)swl00403214 | ||
035 | |a (OCoLC)873087913 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b N277 2014 | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Naskar, Ruchira., |e author. | |
245 | 1 | 0 | |a Reversible digital watermarking : |b theory and practices / |c Ruchira Naskar, Rajat Subhra Chakraborty. |
264 | 1 | |a San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : |b Morgan & Claypool, |c 2014. | |
300 | |a 1 PDF (xxiii, 106 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Synthesis lectures on information security, privacy, and trust, |x 1945-9750 ; |v # 10 | |
500 | |a Part of: Synthesis digital library of engineering and computer science. | ||
500 | |a Series from website. | ||
504 | |a Includes bibliographical references (pages 99-104). | ||
505 | 0 | |a 1. Introduction -- 1.1 Digital watermarking -- 1.2 Fragile and robust watermarking techniques -- 1.3 Reversible digital watermarking -- 1.3.1 Importance of reversible watermarking -- | |
505 | 8 | |a 2. Motivational case studies -- 2.1 Investigating the effects of DRM practices on medical images -- 2.1.1 Background -- 2.1.2 Methodology -- 2.1.3 Results -- 2.1.4 Inferences: effect of lossy watermarking scheme on automated malaria diagnosis -- 2.2 Investigating performance in noisy military environment -- 2.2.1 Experimental setup and simulation results -- 2.2.2 Discussion -- 2.2.3 Summary -- | |
505 | 8 | |a 3. Overview of state-of-the-art reversible watermarking techniques -- 3.1 Introduction -- 3.2 Difference expansion -- 3.3 Data compression -- 3.4 Histogram-bin-shifting -- 3.4.1 Circular histogram-bin-shifting -- 3.5 Pixel prediction -- 3.5.1 A recent reversible data hiding technique based on pixel prediction -- 3.6 Modification of frequency domain characteristics -- 3.7 Summary -- | |
505 | 8 | |a 4. Detailed working of a reversible watermarking algorithm: a technique utilizing weighted median-based prediction -- 4.1 Introduction -- 4.2 Watermark embedding algorithm -- 4.2.1 Selection of base pixels -- 4.2.2 Predicting three sets of pixels -- 4.2.3 Computing prediction errors -- 4.2.4 Embedding watermark bits -- 4.2.5 Combining modified errors with predicted pixels -- 4.3 Watermark extraction algorithm -- 4.3.1 Handling of under/overflow -- 4.4 Overhead bits -- 4.5 Varying the error threshold -- 4.6 Experimental results -- 4.6.1 Application to medical and military images -- 4.6.2 Varying the weights of a weighted-median filter -- 4.7 Summary -- | |
505 | 8 | |a 5. Addressing implementation issues -- 5.1 Managing auxiliary information -- 5.2 Optimizing false pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation platform -- 5.4.1 Working methodology -- 5.4.2 Viewing plots generated in the past -- 5.5 Summary -- | |
505 | 8 | |a 6. Reversible watermarking with tamper localization property -- 6.1 Introduction -- 6.2 Necessary background -- 6.3 Tamper localization in reversible watermarking -- 6.3.1 Bound on tamper localization block size -- 6.4 The method of tamper localization -- 6.4.1 Merging of tamper localization unit blocks -- 6.4.2 An application -- 6.4.3 False rejection as a consequence of block merging -- 6.5 Experimental results and discussion -- 6.5.1 Robustness against false rejection -- 6.5.2 Watermark transparency and embedding capacity results -- 6.6 Summary -- | |
505 | 8 | |a 7. Looking forward -- Bibliography -- Authors' biographies. | |
506 | |a Abstract freely available; full-text restricted to subscribers or individual document purchasers. | ||
510 | 0 | |a Compendex | |
510 | 0 | |a Google book search | |
510 | 0 | |a Google scholar | |
510 | 0 | |a INSPEC | |
520 | 3 | |a Digital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintain perfect integrity of the original multimedia "cover data." In non-reversible watermarking schemes, after embedding and extraction of the watermark, the cover data undergoes some distortions, although perceptually negligible in most cases. In contrast, in reversible watermarking, zero-distortion of the cover data is achieved, that is the cover data is guaranteed to be restored bit-by-bit. Such a feature is desirable when highly sensitive data is watermarked, e.g., in military, medical and legal imaging applications. This work deals with development, analysis and evaluation of state-of-the-art reversible watermarking techniques for digital images. In this work we establish the motivation for research on reversible watermarking using a couple of case studies with medical and military images.We present a detailed review of the state-of-the-art research in this field.We investigate the various subclasses of reversible watermarking algorithms, their operating principles and computational complexities. Along with this, to give the readers an idea about the detailed working of a reversible watermarking scheme, we present a prediction-based reversible watermarking technique, recently published by us.We discuss the major issues and challenges behind implementation of reversible watermarking techniques, and recently proposed solutions for them. Finally, we provide an overview of some open problems and scope of work for future researchers in this area. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
538 | |a System requirements: Adobe Acrobat Reader. | ||
588 | |a Title from PDF title page (viewed on March 15, 2014). | ||
650 | 0 | |a Digital rights management. | |
650 | 0 | |a Digital watermarking. | |
653 | |a digital rights management | ||
653 | |a digital watermarking | ||
653 | |a lossless data hiding | ||
653 | |a multimedia data | ||
653 | |a reversibility | ||
700 | 1 | |a Chakraborty, Rajat Subhra., |e author. | |
776 | 0 | 8 | |i Print version: |z 9781627053150 |
830 | 0 | |a Synthesis digital library of engineering and computer science. | |
830 | 0 | |a Synthesis lectures on information security, privacy, and trust ; |v # 10. |x 1945-9750 | |
856 | 4 | 8 | |3 Abstract with links to full text |u http://dx.doi.org/10.2200/S00567ED1V01Y201401SPT010 |
942 | |c EB | ||
999 | |c 81098 |d 81098 | ||
952 | |0 0 |1 0 |4 0 |7 0 |9 73118 |a MGUL |b MGUL |d 2016-03-20 |l 0 |r 2016-03-20 |w 2016-03-20 |y EB |