Intelligent Watermarking Techniques with Source Code (Innovative Intelligence Volume 7)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected at all costs from attackers. This book presents the recent advances in the theory and implementation of watermarking techniques. It brings together, for the first time, the successful applications of intelligent paradigms (including comparisons with conventional methods) in many areas. The accompanying CD-Rom provides readers with source codes and executables to put into practice general topics in watermarking. Intelligent Watermarking Techniques will be of great value to undergraduate and postgraduate students in many disciplines, including engineering and computer science. It is also targeted at researchers, scientists and engineers.

Author(s): Jeng-Shyang Pan, Hsiang-Cheh Huang, L. C. Jain
Year: 2004

Language: English
Pages: 852

Front Cover......Page 1
Series on Innovative Intelligence......Page 3
Title Page
......Page 4
Copyright
......Page 5
PREFACE......Page 6
CONTENTS......Page 8
PART I Fundamentals of Watermarking and Intelligent Techniques......Page 12
1 Introduction......Page 14
2 Some Terminology......Page 16
3 Applications......Page 20
4 Requirements......Page 22
5.1 Perceptible and Imperceptible Watermarks......Page 26
5.2.2 Fragile watermarks......Page 27
6.1 Spatial Domain Watermarking......Page 31
7.1 Extraction with/without The Original Multimedia Contents......Page 32
7.2 The Public / Secret Keys......Page 33
8.1.1 VQ compression......Page 34
8.3 Spatial Filtering......Page 35
9 Watermarking Benchmarks......Page 36
10.1 Internet Resources......Page 37
10.2 Special Issues in International Journals......Page 38
10.3 Books......Page 39
10.4 Related Sessions in International Conferences......Page 41
11 Organization of This Book......Page 42
References......Page 43
1 Introduction......Page 52
2 A Neuro-Fuzzy Learning Algorithm......Page 55
3 Extraction of Typical Data from Training Data Based on FCM......Page 59
4 Numerical Examples......Page 63
References......Page 72
1 Evolutionary Computation......Page 78
2 Genetic Algorithms......Page 82
2.1 Selection Methods......Page 84
2.2 Creating Offspring......Page 86
3.1 Evolution Strategies and Evolutionary Programming......Page 88
3.2 Genetic Programming......Page 91
4 Parallelizing Simulated Evolution......Page 96
4.1 Coarse-Grain Models......Page 97
4.2 Fine-Grain Models......Page 99
5 Summary......Page 101
References......Page 102
1 Introduction......Page 108
2 Genetic Algorithms......Page 109
3 Ant Systems......Page 116
4 Particle Swarm Optimization......Page 121
5 Discussions and Conclusions......Page 125
References......Page 127
PART II Watermarking Techniques......Page 144
1 Introduction......Page 146
2 General Embedding Structures in The Spatial Domain......Page 147
3 General Extraction Structures in The Spatial Domain......Page 149
4.2 Selecting The Embedding Positions......Page 151
5.1 Video Watermarking Applications......Page 152
6 Conclusions......Page 153
References......Page 154
1 Introduction......Page 158
2 General Structures for Transform Domain Watermarking......Page 159
3.1 Discrete Fourier Transform OFT)......Page 160
3.2 Discrete Cosine Transform (DCT)......Page 161
3.3 Discrete Wavelet Transform (DWT)......Page 162
4.1 Transform-Domain Image Watermarking......Page 163
4.2 Spread Spectrum Transform-Domain Watermarking......Page 165
4.3 Image Adaptive Transform-Domain Watermarking......Page 167
4.4 Compressed-Domain Video Watermarking......Page 168
References......Page 170
1 Introduction......Page 176
2 Watermarking Scheme Based on VQ Indices......Page 181
3 Watermarking Scheme Based on Secret Keys......Page 185
4 Discussions and Conclusions......Page 189
References......Page 192
Audio Watermarking Techniques......Page 196
1 Introduction......Page 197
2 Spread-Spectrum Method......Page 199
2.1 Basic Idea......Page 200
2.2 Pseudo-Random Sequence......Page 202
2.3 Watermark Shaping......Page 203
3 Two-Set......Page 207
3.1 Patchwork Scheme......Page 208
3.2 Amplitude Modification......Page 211
4.1 Echo Hiding......Page 212
4.2 Replica Modulation......Page 213
5.1 Time-Scale Modification......Page 215
5.2 Salient Features......Page 216
6 Synchronization......Page 217
6.1 Coarse Alignment......Page 218
6.3 Salient Point Extraction......Page 219
6.4 Redundant-Chip Coding......Page 220
6.5 Beat-Scaling Transform......Page 221
7 Conclusions......Page 222
Acknowledgments......Page 223
References......Page 224
Video Watermarking: Requirements, Problems and Solutions......Page 230
1.1.1 Raw Video Sequences Watermarking......Page 231
1.1.2 MPEG Compression with Watermarking......Page 233
1.1.3 Watermarking MPEG Compression Stream......Page 234
1.2.1 Broadcasting Environments for Video Watermarking......Page 236
1.2.2 Application Scenario......Page 238
1.2.3 Requirements and Problems......Page 239
2.1 Overview......Page 242
2.2 Algorithm Description......Page 243
2.3 Transparent Quality......Page 247
2.3.2 Smooth Blocks......Page 249
2.3.5 Robustness against Compression and Practical Evaluation......Page 250
3.1 Motivations......Page 252
3.2.1 The Affine Transformation......Page 253
3.2.3 The Time-axis Template......Page 254
3.2.4 Video Watermarking based on Time-Axis Templates......Page 256
3.3 Watermarking along the Time-Axis......Page 257
3.3.1 Watermark Generation......Page 258
3.3.2 Invisibility of Watermarks......Page 260
3.3.3.1 Adaptive Embedding Process......Page 264
3.3.3.2 Adaptive Detection Process......Page 265
3.3.4 Security of Watermark......Page 266
3.4 The Temporal Synchronization......Page 267
4 Conclusions......Page 269
References......Page 270
1 Introduction......Page 276
1.1 Video vs. Still Image Watermarking......Page 277
1.2 Applications......Page 279
2.1 Figures......Page 281
2.2 Paradigms......Page 282
3 Video Watermarking Algorithms......Page 284
3.2 Pixel Domain Methods......Page 285
3.2.1 1D spread spectrum modulation......Page 286
3.2.2 Just another watermarking system (2D spread spectrum)......Page 288
3.2.3 Spatially localized image dependent watermarking......Page 290
3.2.4 CDMA modulation......Page 292
3.3 Transform Domain Methods......Page 295
3.3.1 MPEG-2-based techniques......Page 296
3.3.2 Frame-based techniques......Page 302
3.3.3 Group-of-frame-based techniques......Page 309
4.1 Why Hardware?......Page 315
4.2.1 Application constraints......Page 317
5 Predicted Trends in Video Watermarking Research......Page 319
References......Page 320
1 Introduction......Page 326
2 Characteristics of A WatermarkingSystem......Page 328
3 Benchmarking Principles......Page 329
3.1 Algorithmic Complexity......Page 332
3.2 Visual Quality......Page 333
3.3 Watermark Detection Performance......Page 336
3.4 Message Decoding Performance......Page 342
3.5 Payload......Page 343
4 Result Summarization......Page 344
5 Method Comparison and Conformance to A Set of Specifications......Page 348
6.1 Stirmark......Page 350
6.3 Optimark......Page 351
6.4 Certimark......Page 354
7 Conclusions......Page 356
References......Page 357
1 Introduction......Page 362
2.1 Embedding The Watermark......Page 364
3 Simulation Results......Page 370
3.1 The Conventional Scheme......Page 371
3.2 The Progressive Transmission Scheme......Page 378
4 Summary......Page 384
PART III Advanced Watermarking Techniques......Page 360
1 Introduction......Page 388
2.1 Embedding Procedure......Page 389
2.2 Extraction Procedure......Page 391
2.3 Performance......Page 392
3.1.1 General Steps......Page 394
3.1.2 Preprocessing......Page 396
3.1.3 Details about the GA Training Steps......Page 397
3.2 Performance......Page 399
3.3 Discussion about More Attacking Functions......Page 401
4 Discussion and Conclusions......Page 402
References......Page 403
1 Introduction......Page 406
2 Neural Networks......Page 409
3.1 Image Watermarking System Based on Discrete Cosine Transform Using Neural Networks......Page 413
3.2 A Watermarking System Using Neural Networks in Spatial Domain for Color Images......Page 415
4.1 Embedding Phase......Page 420
4.2 Extracting Phase......Page 425
5 Experiments......Page 426
6 Discussion......Page 430
7 Conclusions......Page 434
References......Page 436
1 Introduction......Page 440
2 Related Works......Page 444
3 Support Vector Machines......Page 446
3.1 Linear SVM for Two-Class Separable Data......Page 447
3.2 Linear SVM for Multi-Class Separable Data......Page 449
4 The Watermarking Scheme Using Support Vector Machines......Page 450
4.1 Location Decision Phase......Page 452
4.2 Watermark Embedding Phase......Page 453
4.3 Watermark Extracting Phase......Page 455
5 Experimental Results......Page 456
6 Discussions......Page 461
References......Page 464
1 Introduction......Page 470
2.1 Two-Out-Of-Two VSS......Page 472
2.2 Encrypting Secret into Meaningful Shares......Page 475
3 Color Visual Cryptography......Page 479
3.1 Verheul and Van Tilborg’s Scheme......Page 480
3.2 Yang and Laih’s Scheme......Page 482
3.3 The Variations of Colored VSS Scheme......Page 483
4 Applications of Visual Cryptography......Page 484
4.1 Visual Authentication......Page 485
4.2 Intellectual Copyright Protection......Page 486
References......Page 487
1 Introduction......Page 492
2 Spatial Domain Based Scheme......Page 493
2.1.1 Classification of Block Type......Page 496
2.1.2 Generating Watermarks......Page 499
2.1.3 Stacking Procedure and Reduction Procedure......Page 503
2.2.1 Embedding Procedure......Page 504
2.3 Performance......Page 505
3 Vector Quantisation Domain Schemes......Page 511
3.1 Gain-Shape VQ......Page 512
4xm.......Page 515
3.3 Watermarking Algorithm......Page 517
14......Page 519
3.4 Performance......Page 520
4 Conclusions......Page 522
References......Page 523
1 Introduction......Page 526
2.1 Spread-Spectrum Technology......Page 528
2.2 SS-based Video Watermarking in Uncompressed Domain......Page 531
2.3 Synchronization in SS-based Video Watermarking......Page 533
2.3.2 Embedding Side-information for Synchronization......Page 534
2.4 SS-based Video Watermarking in Compressed Domain......Page 535
2.4.1 Bit-rate Constraint of MPEG Coded Data......Page 537
3 DVD Video Copy Protection......Page 538
3.1.2 Embedding and Detection in Spatial Domain......Page 539
3.1.3 Payload......Page 540
3.1.4 Shift Invariance......Page 541
3.2.2 Robustness......Page 542
4
Interleaving to Combat Random and Bursts of Errors in Video Data Hid-......Page 543
4.1.1 ECC Alone Cannot Correct Bursts of Errors Efficiently......Page 545
4.1.2 The &Interleaved Array Approach to M-D Interleaving......Page 546
4.2 2-D/3-D Successive Packing Interleaving......Page 552
4.2.2 The Successive Packing Algorithm......Page 553
4.2.3 Main Results......Page 555
4.3.1 Applying 2-D SP Interleaving to Enhance Robustness ofStill Image Data Hiding......Page 556
4.3.2 Applying 3-D SP Interleaving to Enhance Robustness ofVideo Sequence Data Hiding......Page 559
5.1 Embedding Side-information for Synchronization......Page 562
5.1.1 Introduction to the Algorithm by Liu et al. (2001)......Page 563
5.1.2 Experimental Results......Page 564
References......Page 567
Part IV Practical Issues in Watermarking and Copyright Protection
......Page 570
Video Watermarking: Approaches,Applications, and Perspectives......Page 572
1 Introduction......Page 573
1.1 Video Watermarking Applications......Page 574
1.2 Video vs. Image Watermarking......Page 576
2.1 Generalities......Page 577
2.2 Examples......Page 578
2.2.1 Raw video watermarking in the spatial domain......Page 579
2.2.2 Raw video watermarking in the frequency domain......Page 581
2.2.3 Compressed domain......Page 584
3.1 Generalities......Page 586
3.2 Examples......Page 587
4.1 Generalities......Page 590
4.3 Examples......Page 591
5 Conclusions......Page 599
References......Page 600
1 Problem Model and Notation......Page 604
2 QIM Basics......Page 606
3 Distortion Compensation......Page 611
4 Signal-to-Noise Ratio Analysis......Page 612
5 Information Theoretic Perspectives......Page 616
6 Hybrid Transmission: A Practical
Application
......Page 618
References......Page 621
Digital Watermarking for Digital Rights Management......Page 624
1 Introduction......Page 625
2 Commercial DRM Solutions......Page 626
2.1 Comparisons among DRM solutions......Page 628
2.2 Summary......Page 634
3 SDMI......Page 635
3.1 Digital Watermarking and Rights Management in SDMI......Page 637
4 SDMI-based RMS......Page 638
4.1 RMS Server, RMDB, and MP......Page 640
5 Digital Watermarking and Rights Information......Page 642
References......Page 646
1 Introduction......Page 650
2 Applications for Copyright Protections......Page 655
2.1 Watermark Embedding for Copyright Protection......Page 656
2.1.1 Mark Type Watermark......Page 658
2.1.2 Literal Type Watermark......Page 659
2.1.3 Standardization for Watermark Robustness......Page 660
2.2 Content Monitoring System......Page 664
2.3 Copyright Administration......Page 666
3.1 Management of Digital Contents......Page 669
3.2.1 Watermarking for Certification I......Page 673
3.2.2 Watermarking for Certification I1......Page 675
3.3 Authentication for Copy Control......Page 677
3.3.1 Copy Control for DVD......Page 678
Applications for Data Hiding......Page 682
4.1 Data Hiding for Information Linking......Page 683
4.2 Data Hiding for Information Retrieving......Page 686
5 Conclusions......Page 688
References......Page 690
APPENDIX......Page 692
1 How to......Page 694
2 Source Codes......Page 701
1 How to Use The System......Page 726
2 Source Codes......Page 731
1 How to Use The System......Page 740
2 Source Codes......Page 745
Appendix D: GA Training Program for Spatial-Based Scheme......Page 750
2 Source Codes......Page 753
1 How to Use The System......Page 766
2 Source Codes......Page 769
1 How to Use The System......Page 774
2 Source Codes......Page 778
1 How to Use The System......Page 780
2 Source Codes......Page 789
1 How to Use The System......Page 798
2 Source Codes......Page 803
Authors’ contact information......Page 816
INDEX......Page 822