ebook img

Techniques and Applications of Digital Watermarking and Content Protection PDF

290 Pages·2003·10.196 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Techniques and Applications of Digital Watermarking and Content Protection

Wolthusen Wolthusen-FM May30,2003 9:54 Techniques and Applications of Digital Watermarking and Content Protection Wolthusen Wolthusen-FM May30,2003 9:54 Forquitealongtime,computersecuritywasarathernarrowfieldofstudy that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systemsingeneral,andoftheInternetandtheWorldWideWeb(WWW) inparticular,thissituationhaschangedfundamentally.Today,computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce. Against this background, thefieldofcomputersecurityhasbecomeverybroadandincludesmany topicsofinterest.Theaimofthisseriesistopublishstate-of-the-art,high standardtechnicalbooksontopicsrelatedtocomputersecurity.Further informationabouttheseriescanbefoundontheWWWatthefollowing URL: http://www.esecurity.ch/serieseditor.html Also, if you’d like to contribute to the series by writing a book about a topic related to computer security, feel free to contact either the Com- missioningEditorortheSeriesEditoratArtechHouse. ForalistingofrecenttitlesintheArtechHouseComputerSecuritySeries, turntothebackofthisbook. Wolthusen Wolthusen-FM May30,2003 9:54 Techniques and Applications of Digital Watermarking and Content Protection Michael Arnold Martin Schmucker Stephen D. Wolthusen Artech House Boston•London www.artechhouse.com Wolthusen Wolthusen-FM May30,2003 9:54 LibraryofCongressCataloging-in-PublicationData Arnold,Michael(MichaelKonrad),1964– Techniquesandapplicationsofdigitalwatermarkingandcontentprotection/Michael Arnold,MartinSchmucker,StephenD.Wolthusen. p.cm.—(ArtechHousecomputersecurityseries) Includesbibliographicalreferencesandindex. ISBN1-58053-111-3(alk.paper) 1.Computersecurity. 2.Digitalwatermarking. 3.Dataprotection. I.Schmucker, Martin. II.Wolthusen,StephenD. III.Title. QA76.9.A25A762003 005.8—dc21 2003049577 BritishLibraryCataloguinginPublicationData Arnold,Michael Techniquesandapplicationsofdigitalwatermarkingandcontentprotection.— (ArtechHousecomputersecurityseries) 1.Digitalwatermarking I.Title II.Schmucker,Martin III.Wolthusen,StephenD. 005.8 ISBN1-58053-111-3 CoverdesignbyYekaterinaRatner (cid:3)c 2003ARTECHHOUSE,INC. 685CantonStreet Norwood,MA02062 Allrightsreserved.PrintedandboundintheUnitedStatesofAmerica.Nopartofthisbook maybereproducedorutilizedinanyformorbyanymeans,electronicormechanical,including photocopying,recording,orbyanyinformationstorageandretrievalsystem,withoutpermission inwritingfromthepublisher. Alltermsmentionedinthisbookthatareknowntobetrademarksorservicemarkshave beenappropriatelycapitalized.ArtechHousecannotattesttotheaccuracyofthisinformation. Useofaterminthisbookshouldnotberegardedasaffectingthevalidityofanytrademarkor servicemark. InternationalStandardBookNumber:1-58053-111-3 LibraryofCongressCatalogCardNumber:2003049577 10987654321 Wolthusen Wolthusen-FM May30,2003 9:54 Toourparents Wolthusen Wolthusen-FM May30,2003 9:54 Wolthusen Wolthusen-FM May30,2003 9:54 Contents Preface....................................................xiii Acknowledgments.........................................xv 1 Introduction.................................................1 1.1 Theoriginsofcopyrightprotection 3 1.2 Theprotectionofintellectualpropertythroughtechnicalmeans 5 1.3 Integrityandauthenticity 11 References 12 2 Digitalwatermarking......................................15 2.1 Rationale 15 2.2 Digitalwatermarkingandcryptography 16 2.2.1 Steganography 16 2.2.2 Digitalwatermarking 19 2.3 Firstgenerationapproaches 19 2.3.1 Basicprinciplesofwatermarking 20 2.3.2 Terminology 21 2.3.3 Firstmethods 23 2.4 Beyondthefirstgeneration 32 References 35 3 Applicationsofdigitalwatermarking......................39 3.1 Usage-specificrequirements 39 3.2 Copyrightprotection 40 3.2.1 Misappropriationbyothercontentproviders 41 3.2.2 Illicitusebyendusers 44 vii Wolthusen Wolthusen-FM May30,2003 9:54 viii Contents 3.3 Annotationwatermarking 46 3.4 Fingerprinting 48 3.5 Automaticplaylistgenerationforrightsverification 49 3.6 Multimediaauthentication 50 3.7 Watermarkingforcopyprotection 51 References 53 4 Digitalwatermarkingforstillimages......................55 4.1 Classificationandapplicationrequirements 55 4.2 Photographicandphotorealisticimages 56 4.2.1 Traditionalwatermarkingmethods 56 4.2.2 Watermarkingmethodsdealingwithgeometricdistortions 63 4.2.3 Content-basedwatermarkingmethods 65 4.3 Binaryandhalftonedimages 67 4.4 Summary 69 References 69 5 Digitalwatermarkingforaudiodata.......................75 5.1 Requirementsanddesign 75 5.1.1 Removalmanipulationsandattacks 76 5.1.2 Misalignmentmanipulationsandattacks 76 5.2 Psychoacousticfactsandmodels 77 5.2.1 Criticalbands 78 5.2.2 Maskingeffects 79 5.2.3 PsychoacousticmodelMPEG1layersIandII 81 5.3 Perceptualaudiowatermarking 88 5.3.1 Spectralweighting 89 5.4 Algorithms 90 5.4.1 LSBcoding 91 5.4.2 Embeddingwatermarksintothephase 91 5.4.3 Echohiding 96 5.4.4 Watermarkingofcompressedaudiodata 99 5.4.5 Spread-spectrumaudiowatermarking 102 Wolthusen Wolthusen-FM May30,2003 9:54 Contents ix 5.4.6 Audiowatermarkingviathepatchworktechnique 106 5.4.7 Mechanismsagainstdesynchronizationmanipulations 107 References 111 6 Digitalwatermarkingforothermedia....................115 6.1 Digitalwatermarkingforvideodata 115 6.1.1 Applicationrequirements 115 6.1.2 Algorithms 117 6.2 Digitalwatermarkingforthree-dimensionaldata 121 6.2.1 Applicationrequirements 121 6.2.2 Datarepresentation 122 6.2.3 Operationsandattacks 124 6.2.4 Algorithms 125 6.2.5 Quality 135 6.3 Digitalwatermarkingfortwo-dimensionalgeometrydata 136 6.4 Digitalwatermarkingforformattedtext 136 6.4.1 Applicationrequirements 137 6.4.2 Algorithms 137 6.5 Musicscores 138 6.5.1 Applicationrequirements 138 6.5.2 Algorithms 139 References 140 7 Attacksandbenchmarksofdigital watermarkingsystems...................................147 7.1 Threatsandriskanalysis 148 7.2 Attacks 149 7.2.1 Classificationofattacks 149 7.2.2 Removalattacksandmanipulations 151 7.2.3 Desynchronizationattacks 159 7.2.4 Embeddingattacks 164 7.2.5 Detectionattacks 168 7.3 Qualityevaluationofwatermarkedobjects 168 7.3.1 Psychophysicalmethods 169

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.