ebook img

Data hiding fundamentals and applications : content security in digital media PDF

269 Pages·2004·3.149 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Data hiding fundamentals and applications : content security in digital media

Data Hiding Fundamentals and Applications This Page Intentionally Left Blank Data Hiding Fundamentals and Applications Content Security in Digital Media Husrev T. Sencar Mahalingam Ramkumar Ali N. Akansu Amsterdam Boston Heidelberg London NewYork Oxford Paris SanDiego SanFrancisco Singapore Sydney Tokyo ElsevierAcademicPress 525BStreet, Suite1900, SanDiego, California92101-4495, USA 84Theobald’sRoad, LondonWC1X8RR,UK Thisbookisprintedonacid-freepaper. Copyright©2004, ElsevierInc.Allrightsreserved. Nopartofthispublicationmaybereproducedortransmittedinanyformorby anymeans, electronicormechanical, includingphotocopy, recording, orany informationstorageandretrievalsystem, withoutpermissioninwritingfrom thepublisher. PermissionsmaybesoughtdirectlyfromElsevier’sScience&TechnologyRights DepartmentinOxford, UK:phone: (+44)1865843830, fax: (+44)1865853333, e-mail: [email protected] viatheElsevierhomepage(http://elsevier.com), byselecting“CustomerSupport” andthen“ObtainingPermissions.” LibraryofCongressCataloging-in-PublicationData Sencar, HusrevT. Datahidingfundamentalsandapplications/HusrevT.Sencar,MahalingamRamkumar, AliN.Akansu. p. cm. Includesbibliographicalreferencesandindex. ISBN0-12-047144-2(alk. paper) 1. Multimediasystems–Securitymeasures. 2. Dataencryption(Computerscience)I. RamkumarMahalingam. II.Akansu,AliN., 1958-III.Title. QA76.575.S462004 (cid:2) 005.82–dc22 2004052921 BritishLibraryCataloguinginPublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary ISBN:0-12-047144-2 ForallinformationonallAcademicPresspublications visitourWebsiteatwww.academicpress.com PrintedintheUnitedStatesofAmerica 04 05 06 07 08 9 8 7 6 5 4 3 2 1 To our wives: Yelda Bindu Bilge This Page Intentionally Left Blank Contents Preface xiii Foreword xv 1 CHAPTER Introduction 1.1 WhatIsDataHiding? 1 1.2 FormsofDataHiding 2 1.2.1 RelativeImportanceofCoverSignals 3 1.2.2 NatureofContent 4 1.2.3 ObliviousandNonoblivious 4 1.2.4 SynchronousandAsynchronous 4 1.2.5 ActiveandPassiveWardens 5 1.3 PropertiesofSteganographicCommunications 5 1.3.1 MultimediaDataHiding 6 1.4 TheSteganographicChannel 8 2 CHAPTER FrameworksforDataHiding 2.1 SignalProcessingFramework 14 2.2 DataHidingfro maCommunicationsPerspective 15 2.3 RelationshipBetweenCommunicationsandSignalProcessing Frameworks 17 2.4 AReviewofDataHidingMethods 20 3 CHAPTER CommunicationwithSideInformation and Data Hiding 3.1 Costa’sFramework 27 vii viii Contents 3.2 AFrameworkBasedonChannelAdaptiveEncodingandChannelIndependent Decoding 30 3.2.1 HighlightsoftheCAE-CIDFramework 34 3.3 OntheDualityofCommunicationsandDataHidingFrameworks 35 3.4 CodebookGenerationforDataHidingMethods 40 4 CHAPTER TypeI(Linear)DataHiding 4.1 LinearDataHidinginTransformDomain 50 4.2 ProblemStatement 51 4.3 CapacityofAdditiveNoiseChannels 52 4.4 ModelingChannelNoise 58 4.4.1 ModelingImageNoise 59 4.4.2 ModelingProcessingNoise 59 4.5 VisualThreshold 61 4.6 ChannelCapacityvs. ChoiceofTransform 63 4.7 SomeCapacityResultsandDiscussions 66 4.8 TheIdealDecomposition 74 4.9 FactorsInfluencingChoiceofTransform 76 5 CHAPTER Type II and Type III (Nonlinear) Data Hiding Methods 5.1 TypeIIEmbeddingandDetection 79 5.2 TypeIIIEmbeddingandDetectionMethods 83 5.2.1 PostprocessingTypes 85 5.2.1.1 VectoralEmbeddingandDetection 86 5.2.1.2 ScalarEmbeddingandDetection 87 5.2.2 FormsofDemodulation 87 5.2.2.1 MinimumDistanceDecoding 88 5.2.2.2 MaximumCorrelationRule 90 5.2.3 OptimizationCriteriaforEmbeddingandDetection Parameters 91 5.2.3.1 OptimizationofParametersforVectoralEmbedding andDetection 91 5.2.3.2 OptimizationofParametersforScalarEmbedding andDetection 92 5.2.3.3 MaximizingCorrelation 95 5.2.3.4 MinimizingProbabilityofError 96 5.2.3.5 MaximizingMutualInformation 98 5.3 PerformanceComparisons 98 Contents ix 6 CHAPTER AdvancedImplementations 6.1 SpreadTransforming 108 6.2 MultipleCodebookDataHiding 113 6.2.1 AChannelModelforMultipleCodebookDataHiding 119 6.2.2 SingleCodebookDataHidingBasedontheMaximumCorrelation Criterion 125 6.2.2.1 Distributionofρind 127 6.2.2.2 Distributionofρdep 128 6.2.3 MultipleCodebookDataHidingUsingtheMaximumCorrelation Criterion 130 6.2.3.1 Distributionofρi 132 m,j 6.2.3.2 Distributionofρmax 133 6.2.4 SingleCodebookHidingUsingtheMinimumDistance Criterion 134 6.2.4.1 Distributionofdind 135 6.2.4.2 Distributionofddep 136 6.2.5 MultipleCodebookHidingUsingtheMinimumDistance Criterion 137 6.2.5.1 Distributionofdi 139 m,j 6.2.5.2 Distributionofdmin 139 6.2.6 Comparisons 139 6.2.7 ImplementationandSimulationResults 147 7 CHAPTER MajorDesignIssues 7.1 DFT-BasedSignaling 154 7.1.1 ConventionalSignaling 154 7.1.2 FFT-BasedSignaling 155 7.1.2.1 CyclicAll-PassSequences 155 7.1.2.2 SignalConstellation 157 7.1.2.3 RedundantSignaling 158 7.2 Synchronizatio n 160 7.2.1 AutocorrelationforRestoringtheCroppedSignal 162 7.2.2 PracticalConcerns 165 7.2.2.1 WatermarkSignalDesign 165 7.2.2.2 CyclicAutocorrelation 165 7.2.3 Synchronization 167 7.2.4 Results 167 7.3 PerceptualConstraints 170 7.4 AttacksonDataHidingSystems 172 7.4.1 RemovalAttacks 173 7.4.1.1 BlindAttacks 173 7.4.1.2 EstimationAttacks 174

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.