Information Hiding

A successor to the popular Artech House book Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date resource gives a thorough review of steganography, digital watermarking, and media fingerprinting with possible applications to modern communication. This practical resource explores steganography and also includes as introduction to watermarking and its methods. This book gives you a working knowledge of watermaking's pros and cons, as well as the implications of watermarking to solve copyright issues on the Internet.

1030603049
Information Hiding

A successor to the popular Artech House book Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date resource gives a thorough review of steganography, digital watermarking, and media fingerprinting with possible applications to modern communication. This practical resource explores steganography and also includes as introduction to watermarking and its methods. This book gives you a working knowledge of watermaking's pros and cons, as well as the implications of watermarking to solve copyright issues on the Internet.

129.0 In Stock
Information Hiding

Information Hiding

by Stefan Katzenbeisser
Information Hiding

Information Hiding

by Stefan Katzenbeisser

Hardcover

$129.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

A successor to the popular Artech House book Information Hiding Techniques for Steganography and Digital Watermarking, this comprehensive and up-to-date resource gives a thorough review of steganography, digital watermarking, and media fingerprinting with possible applications to modern communication. This practical resource explores steganography and also includes as introduction to watermarking and its methods. This book gives you a working knowledge of watermaking's pros and cons, as well as the implications of watermarking to solve copyright issues on the Internet.


Product Details

ISBN-13: 9781608079285
Publisher: Artech House, Incorporated
Publication date: 12/31/2015
Pages: 312
Product dimensions: 6.30(w) x 9.30(h) x 0.90(d)

Table of Contents

Preface ix

Foreword xi

List of Contributors xv

Chapter 1 Introduction to Information Hiding 1

1.1 A Brief History of Information Hiding 1

1.2 Disciplines of Information Hiding 4

1.3 Applications of Information Hiding 7

1.4 Types of Steganography 9

1.5 Security of Steganographic Systems 14

Chapter 2 Multimedia Steganography 21

2.1 Multimedia Covers 22

2.2 Popular Embedding Operations and Building Blocks 25

2.3 Minimizing Embedding Impact-A Separation Principle 27

2.4 Embedding by Syndrome Trellis Coding 36

2.5 Security 40

Chapter 3 Steganalysis 45

3.1 Steganalysis as Signal Detection 46

3.2 Image Representations 54

3.3 Quantitative Steganalysis 62

3.4 Special Topics 66

3.5 Steganalysis in the Wide Sense 71

Chapter 4 Network Steganography 81

4.1 Introduction 81

4.2 Understanding Network Steganography 83

4.3 Major Applications of Network Steganography 89

4.4 A Review of Network Steganography Methods 91

4.5 Detection and Countermeasures 98

4.6 Summary 101

Chapter 5 Robust Watermarking 105

5.1 Introduction 105

5.2 The Content Adaptation Layer 107

5.3 Spread-Spectrum Communications 112

5.4 Communications with Side Information 118

5.5 Watermark Synchronization Mechanisms 123

5.6 Benchmarking Watermarking Systems 128

5.7 Applications 131

5.8 Research Outlook 135

Chapter 6 Watermarking Security 145

6.1 Introduction 145

6.2 Examples of Worst-Case Attacks 150

6.3 How to Measure Watermarking Security 154

6.4 Algorithms and Tools 160

6.5 What we Know so far About Watermarking Security 161

6.6 Oracle Attacks 162

6.7 Protocol Attacks 168

6.8 Conclusion 170

Chapter 7 Fingerprinting 175

7.1 Collusion Attacks on Watermarks 175

7.2 Traitor Tracing Codes 181

7.3 Information-Theoretic Approach 185

7.4 Universal Decoders 191

7.5 Joint Decoders 195

7.6 Outlook/Further Reading 195

Chapter 8 Fragile and Authentication Watermarks 201

8.1 Common Challenges 203

8.2 Authentication Watermarks 205

8.3 Fragile Watermarks 208

8.4 Semifragile Watermarks 218

8.5 Reversible Watermarks 222

8.6 Applications 225

Chapter 9 Media Forensics 231

9.1 Objectives 231

9.2 Methods 236

9.3 Limitations and Outlook 251

Chapter 10 Watermarking in the Encrypted Domain 261

10.1 Introduction 261

10.2 A Few Preliminaries 264

10.3 Asymmetric Fingerprinting Protocols 266

10.4 Client-side Watermark Embedding 274

10.5 Reversible Watermarking of Encrypted Content 280

10.6 Summary 282

From the B&N Reads Blog

Customer Reviews