Online Library TheLib.net » Multimedia Data Hiding
cover of the book Multimedia Data Hiding

Ebook: Multimedia Data Hiding

00
27.01.2024
0
0

The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur­ poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be­ comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con­ trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im­ perceptibility, robustness against moderate processing such as compression is also an important consideration.




The digital revolution has brought about profound changes in our society and our lives. This book discusses the issues regarding multimedia data hiding and its application to multimedia security and communication, addressing both theoretical and practical aspects and tackling both design and attack problems. The book is organized into three parts. In the fundamental issues part, a few key elements of data hiding are identified through a layered structure; data hiding is modeled as a communication problem where the embedded data is the signal to be transmitted. A comprehensive solution is proposed that addresses considerations for choosing constant- or variable embedding rate and enhancing performance in each case. Algorithm and system designs are presented in the second part for binary images, grayscale and color images, and videos. The designs provide concrete examples, such as annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Finally, in the third part, attacks and countermeasures for both known and unknown data-hiding algorithms are considered, respectively, for problems surrounding digital watermarking and digital music.


The digital revolution has brought about profound changes in our society and our lives. This book discusses the issues regarding multimedia data hiding and its application to multimedia security and communication, addressing both theoretical and practical aspects and tackling both design and attack problems. The book is organized into three parts. In the fundamental issues part, a few key elements of data hiding are identified through a layered structure; data hiding is modeled as a communication problem where the embedded data is the signal to be transmitted. A comprehensive solution is proposed that addresses considerations for choosing constant- or variable embedding rate and enhancing performance in each case. Algorithm and system designs are presented in the second part for binary images, grayscale and color images, and videos. The designs provide concrete examples, such as annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Finally, in the third part, attacks and countermeasures for both known and unknown data-hiding algorithms are considered, respectively, for problems surrounding digital watermarking and digital music.
Content:
Front Matter....Pages i-xix
Introduction....Pages 1-11
Front Matter....Pages 13-13
Preliminaries....Pages 15-17
Basic Embedding Mechanisms....Pages 19-40
Handling Uneven Embedding Capacity....Pages 41-62
Front Matter....Pages 63-63
Data Hiding in Binary Image....Pages 65-91
Multilevel Data Hiding for Image and Video....Pages 93-118
Data Hiding for Image Authentication....Pages 119-136
Data Hiding for Video Communication....Pages 137-146
Front Matter....Pages 147-147
Attacks and Countermeasures on Known Data Hiding Algorithms....Pages 149-173
Attacks on Unknown Data Hiding Algorithms....Pages 175-190
Conclusions and Perspectives....Pages 191-192
Back Matter....Pages 193-219


The digital revolution has brought about profound changes in our society and our lives. This book discusses the issues regarding multimedia data hiding and its application to multimedia security and communication, addressing both theoretical and practical aspects and tackling both design and attack problems. The book is organized into three parts. In the fundamental issues part, a few key elements of data hiding are identified through a layered structure; data hiding is modeled as a communication problem where the embedded data is the signal to be transmitted. A comprehensive solution is proposed that addresses considerations for choosing constant- or variable embedding rate and enhancing performance in each case. Algorithm and system designs are presented in the second part for binary images, grayscale and color images, and videos. The designs provide concrete examples, such as annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Finally, in the third part, attacks and countermeasures for both known and unknown data-hiding algorithms are considered, respectively, for problems surrounding digital watermarking and digital music.
Content:
Front Matter....Pages i-xix
Introduction....Pages 1-11
Front Matter....Pages 13-13
Preliminaries....Pages 15-17
Basic Embedding Mechanisms....Pages 19-40
Handling Uneven Embedding Capacity....Pages 41-62
Front Matter....Pages 63-63
Data Hiding in Binary Image....Pages 65-91
Multilevel Data Hiding for Image and Video....Pages 93-118
Data Hiding for Image Authentication....Pages 119-136
Data Hiding for Video Communication....Pages 137-146
Front Matter....Pages 147-147
Attacks and Countermeasures on Known Data Hiding Algorithms....Pages 149-173
Attacks on Unknown Data Hiding Algorithms....Pages 175-190
Conclusions and Perspectives....Pages 191-192
Back Matter....Pages 193-219
....
Download the book Multimedia Data Hiding for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen