Steganography and Watermarking

Ching-Nung Yang, Chia-Chen Lin and Chin-Chen Chang (Editors)
Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan

Series: Privacy and Identity Protection
BISAC: LAW116000

Clear

$240.00

Volume 10

Issue 1

Volume 2

Volume 3

Special issue: Resilience in breaking the cycle of children’s environmental health disparities
Edited by I Leslie Rubin, Robert J Geller, Abby Mutic, Benjamin A Gitterman, Nathan Mutic, Wayne Garfinkel, Claire D Coles, Kurt Martinuzzi, and Joav Merrick

eBook

Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:

Quantity:

Details

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data is generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book “Steganography and Watermarking” introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users’ malicious intention.

In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognized by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science and Applied Mathematics, and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting. (Imprint: Nova)

Preface

Chapter 1. Data Hiding for Binary Images
(Cheonshik Kim, Department of Computer Science, Sejong University, Republic of Korea)

Chapter 2. Reversible Data Hiding Scheme for Halftone Images
(Pei-Feng Shiu, Jinn-Ke Jan and Chia-Chen Lin, Department of Computer Science and Engineering, National Chung Hsing University, Taichung, Taiwan, and others)

Chapter 3. Reversible Data Hiding Schemes for JPEG Images
(Yongdong Wu, Cryptography and Security Department, Institute for Infocomm Research, Singapore)

Chapter 4. Lossless Data Hiding Based on VQ
(Xing-Tian Wang, Zhi-Hui Wang, Chin-Chen Chang and Ming-Chu Li, School of Software, Dalian University of Technology, Dalian, Liaoning, China, and others)

Chapter 5. A High Quality Steganographic Scheme with Pixel-Value Differencing
(Ching-Nung Yang, Wen-Chung Kuo and Shih-Han Chang, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan, and others)

Chapter 6. Reversible Data Hiding Based on Histogram Technique
(Dao-Shun Wang, Yi Liu, Song Liu, Xing-Fu Xu and Shun-Dong Li, Department of Computer Science and Technology, Tsinghua University, Beijing, China, and others)

Chapter 7. Steganography in Script Files
(Chuan Qin, Chin-Chen Chang and Ting-Yu Lin, School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, China, and others)

Chapter 8. The State-of-the-Art Steganography for 3D Meshes
(Wen-Kai Tai, Department of Computer Science and Information Engineering, National Dong Hwa University, Taiwan)

Chapter 9. Steganalysis Algorithm for Detecting the Hidden Information in Images
(Jing-Ming Guo and Thanh-Nam Le, Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan)

Chapter 10. SVD-based Digital Image Watermarking
(Cheng Yang and Tong-tong Liu, Information Engineering School, Communication, University of China, Chaoyang, Beijing, China, and others)

Chapter 11. Robust SVD-DCT Domain Image Watermarking
(Yu-Xin Su and Zhe-Ming Lu, School of Aeronautics and Astronautics,
Zhejiang University, Hangzhou, Zhejiang, China)

Chapter 12. Fragile Watermarking for Content Authentication with Tamper Localization
(Jing-Ming Guo, Tsair Kao, Chih-Hsien Hsia and Yun-Fu Liu, Department of Electrical Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan and others)

Chapter 13. Multiple Watermarking Using Discrete Wavelet Transform
(Jiafa Mao and Yixian Yang, School of Computer Science and Technology,
ZheJiang University of Technology, China, and others)

Chapter 14. Semi-Fragile Watermarking Schemes for H.264 Video
(Jiafa Mao and Yixian Yang, School of Computer Science and Technology,
University of Technology, China, and others)

Chapter 15. Image Watermarking using Visual Cryptography
(Stelvio Cimato, Dipartimento di Informatica, Universita degli Studi di Milano, Italy)

Index

You have not viewed any product yet.