ebook img

Digital Watermarking and Steganography PDF

276 Pages·2017·21.696 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Digital Watermarking and Steganography

Digital Watermarking and Steganography: Fundamentals and Techniques (Second Edition) Frank Y. Shih New Jersey Institute of Technology CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2017 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business International Standard Book Number-13: 978-1-4987-3876-7 (Hardback) Library of Congress Cataloging-in-Publication Data Names: Shih, Frank Y., author. Title: Digital watermarking and steganography : fundamentals and techniques / Frank Y. Shih. Description: Second edition. | Boca Raton : Taylor & Francis, CRC Press, 2017. | Includes bibliographical references. Identifiers: LCCN 2016048478| ISBN 9781498738767 (hardback : alk. paper) | ISBN 9781498738774 (ebook) Subjects: LCSH: Digital watermarking. | Data encryption (Computer science) | Computer security. | Multimedia systems--Security measures. | Intellectual property. Classification: LCC QA76.9.A25 S467 2017 | DDC 005.8/2--dc23 LC record available at https://lccn.loc.gov/2016048478 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface......................................................................................................................xv Acknowledgments ...................................................................................................xix Author .....................................................................................................................xxi Chapter 1 Introduction ..........................................................................................1 1.1 Digital Watermarking ................................................................1 1.2 Digital Steganography ...............................................................4 1.3 Differences between Watermarking and Steganography ..........5 1.4 A Brief History ..........................................................................5 References ............................................................................................6 Appendix: Selected List of Books on Watermarking and Steganography ..............................................................................8 Chapter 2 Classification in Digital Watermarking ................................................9 2.1 Classification Based on Characteristics .....................................9 2.1.1 Blind versus Nonblind ..................................................9 2.1.2 Perceptible versus Imperceptible ...............................10 2.1.3 Private versus Public ..................................................10 2.1.4 Robust versus Fragile .................................................10 2.1.5 Spatial Domain Based versus Frequency Domain Based ..........................................................................11 2.2 Classification Based on Applications ......................................11 2.2.1 Copyright Protection ..................................................12 2.2.2 Data Authentication ...................................................12 2.2.3 Fingerprinting ............................................................13 2.2.4 Copy Control ..............................................................13 2.2.5 Device Control ...........................................................13 References ..........................................................................................14 Chapter 3 Mathematical Preliminaries ...............................................................15 3.1 Least-Significant-Bit Substitution ............................................15 3.2 Discrete Fourier Transform .....................................................15 3.3 Discrete Cosine Transform ......................................................17 3.4 Discrete Wavelet Transform ....................................................18 3.5 Random Sequence Generation ................................................20 3.6 Chaotic Map ............................................................................23 3.7 Error Correction Code .............................................................25 3.8 Set Partitioning in Hierarchical Tree ......................................29 References ..........................................................................................33 Chapter 4 Digital Watermarking Fundamentals .................................................35 4.1 Spatial Domain Watermarking ................................................35 4.1.1 Substitutive Watermarking in the Spatial Domain ....35 4.1.2 Additive Watermarking in the Spatial Domain .........37 4.2 Frequency Domain Watermarking ..........................................39 4.2.1 Substitutive Watermarking in the Frequency Domain .......................................................................39 4.2.2 Multiplicative Watermarking in the Frequency Domain .......................................................................41 4.2.3 Watermarking Based on Vector Quantization ...........42 4.2.4 Rounding Error Problem ............................................44 4.3 Fragile Watermarks .................................................................44 4.3.1 Block-Based Fragile Watermarks ...............................47 4.3.2 Weakness of Block-Based Fragile Watermarks .........49 4.3.3 Hierarchy-Based Fragile Watermarks ........................49 4.4 Robust Watermarks .................................................................51 4.4.1 Redundant Embedding Approach ..............................51 4.4.2 Spread Spectrum ........................................................51 References ..........................................................................................53 Chapter 5 Watermarking Attacks and Tools .......................................................55 5.1 Image-Processing Attacks .......................................................55 5.1.1 Attack by Filtering .....................................................56 5.1.2 Attack by Remodulation ............................................57 5.1.3 Attack by JPEG Coding Distortion ............................58 5.1.4 Attack by JPEG 2000 Compression ...........................58 5.2 Geometric Attacks ...................................................................59 5.2.1 Attack by Image Scaling ............................................59 5.2.2 Attack by Rotation .....................................................60 5.2.3 Attack by Image Clipping ..........................................62 5.2.4 Attack by Linear Transformation ...............................62 5.2.5 Attack by Bending .....................................................63 5.2.6 Attack by Warping .....................................................63 5.2.7 Attack by Perspective Projection ...............................63 5.2.8 Attack by Collage .......................................................64 5.2.9 Attack by Templates ...................................................64 5.3 Cryptographic Attacks ............................................................65 5.4 Protocol Attack ........................................................................65 5.5 Watermarking Tools ................................................................66 5.6 An Efficient Block-Based Fragile Watermarking System For Tamper Localization and Recovery ..................................66 5.6.1 Related Work ..............................................................67 5.6.1.1 Vector Quantization Attack ........................67 5.6.1.2 Cyclic Redundancy Checksum ...................67 5.6.1.3 Comparison of Existing Methodologies .....67 5.6.1.4 Lookup Table Generation ...........................68 5.6.2 Proposed Method .......................................................69 5.6.2.1 Watermark Embedding ...............................69 5.6.2.2 Tamper Detection .......................................70 5.6.2.3 Recovery of Tampered Blocks ....................73 5.6.2.4 Extension to Color Images ..........................74 5.6.3 Results and Discussions .............................................75 References ..........................................................................................82 Chapter 6 Combinational Domain Digital Watermarking ..................................85 6.1 Overview of Combinational Watermarking ............................85 6.2 Watermarking in the Spatial Domain......................................87 6.3 Watermarking in the Frequency Domain ................................88 6.4 Experimental Results...............................................................90 6.5 Further Encryption of Combinational Watermarking .............93 References ..........................................................................................95 Chapter 7 Watermarking Based on Genetic Algorithms ....................................97 7.1 Introduction to Genetic Algorithms ........................................97 7.1.1 Chromosomes .............................................................98 7.1.2 Basic Operations of Genetic Algorithms ...................99 7.1.2.1 Reproduction .............................................100 7.1.2.2 Crossover ..................................................100 7.1.2.3 Mutation ....................................................101 7.1.3 Fitness Function .......................................................101 7.2 Concept of GA-Based Watermarking ....................................102 7.3 GA-Based Rounding Error Correction Watermarking..........103 7.3.1 Definitions of Chromosome, Fitness Function, and GA Operations ...................................................105 7.3.1.1 Chromosomes ...........................................105 7.3.1.2 Fitness Function ........................................106 7.3.1.3 Reproduction .............................................106 7.3.1.4 Crossover ..................................................107 7.3.1.5 Mutation ....................................................107 7.3.2 GA-Based Rounding Error Correction Algorithm ...107 7.3.3 Advanced Strategy for Initializing the First Population .................................................................108 7.4 Applications to Medical Image Watermarking .....................111 7.4.1 Overview of the Proposed Technique ......................113 7.4.1.1 Signature Image ........................................113 7.4.1.2 Textual Data ..............................................114 7.4.1.3 Watermarking Algorithm for Medical Images .......................................................116 7.4.2 Improved Scheme Based on Genetic Algorithms ....117 7.4.3 E xperimental Results ...............................................119 7.5 Authentication of JPEG Images Based on Genetic Algorithms .............................................................................122 7.5.1 G A-Based Watermark-Embedding Method .............123 7.5.1.1 Overall Watermark-Embedding Procedure ..................................................123 7.5.1.2 Authentication Information Generation ....124 7.5.1.3 Adjustment by GA ....................................126 7.5.2 A uthentication ..........................................................128 7.5.3 E xperimental Results ...............................................130 References ........................................................................................134 Chapter 8 Adjusted-Purpose Watermarking .....................................................137 8.1 An Adjusted-Purpose Digital Watermarking Technique ......137 8.1.1 Overview of Adjusted-Purpose Digital Watermarking ..........................................................137 8.1.2 Morphological Approach to Extracting Pixel- Based Features .........................................................139 8.1.3 Strategies for Adjusting VSTWs and QFs ................141 8.1.4 Experimental Results ...............................................145 8.1.5 Collecting Approach to Generating VSTWs ............146 8.2 Adjusted-Purpose Watermarking Using Particle Swarm Optimization ..........................................................................148 8.2.1 Proposed Technique .................................................152 8.2.1.1 ROI Automatic Extraction ........................153 8.2.1.2 Watermark Preprocessing ........................154 8.2.1.3 RONI Partitioning ....................................154 8.2.1.4 Optimal Watermarking Scheme Using PSO ...........................................................155 8.2.1.5 Algorithm for Embedding and Extracting ...............................................157 8.2.2 Experimental Results ...............................................159 References ........................................................................................164 Chapter 9 High-Capacity Watermarking ..........................................................167 9.1 Robust High-Capacity Digital Watermarking .......................167 9.1.1 Weakness of Current Robust Watermarking ...........167 9.1.2 Concept of Robust Watermarking ............................168 9.1.3 Enlargement of Significant Coefficients ..................168 9.1.3.1 Breaking Local Spatial Similarity ............168 9.1.3.2 Block-Based Chaotic Map ........................170 9.1.4 Determination of Embedding Locations .................170 9.1.4.1 Intersection-Based Pixel Collection .........170 9.1.4.2 Reference Register and Container ............171 9.1.5 RHC Watermarking Algorithm ...............................171 9.1.5.1 Embedding Procedure ..............................171 9.1.5.2 Extraction Procedure ................................175 9.1.5.3 Embedding and Extraction Strategies ......175 9.1.6 Experimental Results ...............................................177 9.1.6.1 Capacity Enlargement ...............................177 9.1.6.2 Robust Experiments ..................................179 9.1.6.3 Performance Comparisons .......................180 9.2 High-Capacity Multiple-Regions-of-Interest Watermarking for Medical Images........................................183 9.2.1 Proposed Technique .................................................183 9.2.1.1 Watermark Information Preprocessing and Reconstruction ...................................184 9.2.1.2 RONI Partitioning Algorithm ...................186 9.2.1.3 Algorithm for Embedding and Decoding ...............................................189 9.2.2 Experimental Results ...............................................192 References ........................................................................................197 Chapter 10 Reversible Watermarking .................................................................199 10.1 Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark ...................................................199 10.1.1 Watermarking Scheme .............................................200 10.1.1.1 Embedding Algorithm ..............................200 10.1.1.2 Extraction Algorithm ................................202 10.1.2 Performance Analysis ..............................................203 10.1.2.1 Perceptual Quality ....................................203 10.1.2.2 Reversible Capability ................................205 10.1.2.3 Modification Authentication and Localization Capability ............................205 10.1.2.4 Security .....................................................208 10.1.2.5 Implementation and Other Ideas for Improvement .............................................208 10.2 Reversible Data-Hiding Techniques Using Multiple-Scan Difference-Value Histogram Modification ............................209 10.2.1 Overview of the Multiple-Scan Histogram Modification Algorithm ...........................................210 10.2.2 S ingle-Scan Histogram Modification ......................211 10.2.3 Multiple-Scan Histogram Modification Example ....214 10.2.4 Iterative Algorithm for Determining Embedding Level and Scan Order ...............................................216 10.2.5 E xperimental Results ...............................................217 References ........................................................................................219 Chapter 11 Steganography and Steganalysis ......................................................221 11.1 Steganography .......................................................................222 11.1.1 Types of Steganography ...........................................222 11.1.1.1 Technical Steganography ..........................222 11.1.1.2 Linguistic Steganography .........................223 11.1.1.3 Digital Steganography ..............................224 11.1.2 Applications of Steganography ................................224 11.1.2.1 Convert Communication ...........................224 11.1.2.2 One-Time Pad Communication ................225 11.1.3 Embedding Security and Imperceptibility ...............226 11.1.4 Examples of Steganographic Software ....................226 11.1.4.1 S-Tools ......................................................226 11.1.4.2 StegoDos ...................................................227 11.1.4.3 EzStego .....................................................227 11.1.4.4 JSteg-Jpeg .................................................227 11.2 Steganalysis ...........................................................................228 11.2.1 Image Statistical Properties .....................................228 11.2.2 Visual Steganalytic Systems ....................................230 11.2.3 IQM- Based Steganalytic Systems ............................230 11.2.4 Learning Strategy ....................................................233 11.2.4.1 Introduction to Support Vector Machines ................................................234 11.2.4.2 Neural Networks .......................................236 11.2.4.3 Principal Component Analysis .................237 11.2.5 Frequency Domain Steganalytic System .................238 References ........................................................................................239 Chapter 12 Steganography Based on Genetic Algorithms and Differential Evolution ...........................................................................................243 12.1 Steganography Based on Genetic Algorithms .......................244 12.1.1 Overview of the GA-Based Breaking Methodology ..........................................................244 12.1.1.1 Fitness Function ........................................245 12.1.1.2 Reproduction .............................................245 12.1.1.3 Crossover ..................................................245 12.1.1.4 Mutation ....................................................246 12.1.1.5 Algorithm for Recombining Chromosomes ...........................................246 12.1.2 G A-Based Breaking Algorithms in Spatial Domain Steganalytic Systems .................................247 12.1.2.1 Generating Stego-images in the Visual Steganalytic System ..................................247 12.1.2.2 Generating Stego-images in the Image Quality Measure– Based Spatial Domain Steganalytic System ....................248 12.1.3 GA-Based Breaking Algorithms in Frequency Domain Steganalytic Systems .................................249 12.1.4 Experimental Results ...............................................250 12.1.4.1 GA-Based Breaking Algorithm in the Visual Steganalytic System ......................251 12.1.4.2 GA-Based Breaking Algorithm in the IQM-Based Spatial Domain Steganalytic System ..................................251 12.1.4.3 GA-Based Breaking Algorithm in the JPEG Frequency Domain Steganalytic System .......................................................255 12.1.5 Complexity Analysis ................................................253 12.2 Steganography Based on Differential Evolution ...................255 12.2.1 DE Algorithm and Its Image-Based Steganography .........................................................255 12.2.1.1 Concept .....................................................256 12.2.1.2 Algorithm..................................................257 12.2.1.3 Procedure of Applying Differential Evolution ...................................................259 12.2.2 Experimental Results ...............................................259 References ........................................................................................263 Index ......................................................................................................................265 Preface Digital watermarking and steganography are important topics because digital multi- media is widely used and the Internet is rapidly growing. This book intends to pro- vide a comprehensive overview of the different aspects, mechanisms, and techniques of information security. It is written for students, researchers, and professionals who take the related courses, want to improve their knowledge, and want to gain experi- ence in digital watermarking and steganography. Digital watermarking technology can be used to guarantee authenticity and as proof that the content has not been altered since insertion. Steganographic messages are often first encrypted by some traditional means, and then a covert text is modi- fied in some way to contain the encrypted message. The need for information secu- rity exists everywhere, everyday. This book aims to provide students, researchers, and professionals with tech- nical information regarding digital watermarking and steganography, as well as instruct them on the fundamental theoretical framework for developing the extensive advanced techniques. By comprehensively considering the essential principles of the digital watermarking and steganographic systems, one can not only obtain novel ideas about implementing advanced algorithms but also discover new problems. The principles of digital watermarking and steganography in this book are illustrated with plentiful graphs and examples in order to simplify the problems, so readers can easily understand even complicated theories. Several robust algorithms are presented in this book to illustrate the framework and to provide assistance and tools for understanding and implementing the fun- damental principles. The combined spatial and frequency domain watermarking technique provides a new method of enlarging the embedding capacity of water- marks. The genetic algorithm (GA)-based watermarking technique solves the round- ing error problem and is an efficient approach to embedding. The adjusted-purpose watermarking technique simplifies the selection of different types, and can be inte- grated into other watermarking techniques. The robust high-capacity watermarking technique successfully enlarges the hiding capacity while maintaining the water- mark’ s robustness. GA-based steganography provides a new way of developing a robust steganographic system by artificially counterfeiting statistical features instead of using the traditional strategy of avoiding the alteration of statistical features. OVERVIEW OF THE BOOK In Chapter 1, digital watermarking and digital steganography are briefly introduced. Then, the difference between watermarking and steganography is addressed. Next, a brief history along with updates on recently published resources is provided. The rest of the book is broken into two parts: Chapters 2 through 10 cover digital watermark- ing, and Chapters 11 and 12 cover digital steganography. In Chapter 2, digital watermarking techniques are categorized, based on their char- acteristics, into five pairs: blind versus nonblind, perceptible versus imperceptible,

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.