0

Informed Watermarking

The Springer International Series in Engineering and Computer Science 685

Erschienen am 31.10.2012, 1. Auflage 2002
106,99 €
(inkl. MwSt.)

Nachfragen

In den Warenkorb
Bibliografische Daten
ISBN/EAN: 9781461353201
Sprache: Englisch
Umfang: xxii, 182 S., 6 s/w Illustr.
Einband: kartoniertes Buch

Beschreibung

This book deals with digital watermarking, which is defined by the authors of this book as the art of hiding auxiliary information in digital data in a secure, robust and imperceptible fashion. Digital watermarking as a topic has a long history, but before 1995 publications in scientific literature were almost absent. From 1995 onwards however the number of publications on watermarking has been steadily increasing. Today a number of workshops and conferences on this topic exist; also a number of scientific journals on watermarking have been published. This renewed scientific interest in digital watermarking has led very quickly to industrial interest, as well. In 1996 the Copy Protection Technical Working Group, a voluntary consortium consisting of the movie industry, the IT industry and the consumer electronics industry, issued a call for watermarking technologies for the purpose of copy protection of DVD-Video. A few years later the Secure Digital Music Initiative issued a similar call, in this case focusing on copy protection of digital music. These two efforts have been only partially successful: copy protection based on digital watermarking is not (yet) implemented on a large scale in any type of consumer device. This current "failure" of watermarking, to live up to its expectations, finds its cause in a large number of reasons, ranging from legal considerations and system aspects to the relative immaturity of watermarking as a technology.

Autorenportrait

InhaltsangabeAbbreviations and Acronyms. Notation. Preface. Acknowledgments. 1. Introduction. 2. General Concepts and State-Of-The-Art. 3. Information Embedding Into IID Signals Facing an AWGN Attack. 4. Digital Watermarking: A Game Between Embedder and Attacker. 5. Applications. 6. Summary, Conclusions, and Outlook. Appendices. A. Properties of SCS Transmission. B. Solution of the Watermarking Game for Sawn Attacks. C. Optimization of Attack Strategy for Fixed Embedding Strategy. D. Optimization of the Embedding Strategy. E. Test Images and Additional Results. References. Index.