000 06966nam a2200709 i 4500
001 6812574
003 IEEE
005 20200413152913.0
006 m eo d
007 cr cn |||m|||a
008 140315s2014 caua foab 000 0 eng d
020 _z9781627053150
_qpaperback
020 _a9781627053167
_qebook
024 7 _a10.2200/S00567ED1V01Y201401SPT010
_2doi
035 _a(CaBNVSL)swl00403214
035 _a(OCoLC)873087913
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aQA76.9.A25
_bN277 2014
082 0 4 _a005.8
_223
090 _a
_bMoCl
_e201401SPT010
100 1 _aNaskar, Ruchira.,
_eauthor.
245 1 0 _aReversible digital watermarking :
_btheory and practices /
_cRuchira Naskar, Rajat Subhra Chakraborty.
264 1 _aSan Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
_bMorgan & Claypool,
_c2014.
300 _a1 PDF (xxiii, 106 pages) :
_billustrations.
336 _atext
_2rdacontent
337 _aelectronic
_2isbdmedia
338 _aonline resource
_2rdacarrier
490 1 _aSynthesis lectures on information security, privacy, and trust,
_x1945-9750 ;
_v# 10
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat Reader.
500 _aPart of: Synthesis digital library of engineering and computer science.
500 _aSeries from website.
504 _aIncludes bibliographical references (pages 99-104).
505 8 _a7. Looking forward -- Bibliography -- Authors' biographies.
505 8 _a6. Reversible watermarking with tamper localization property -- 6.1 Introduction -- 6.2 Necessary background -- 6.3 Tamper localization in reversible watermarking -- 6.3.1 Bound on tamper localization block size -- 6.4 The method of tamper localization -- 6.4.1 Merging of tamper localization unit blocks -- 6.4.2 An application -- 6.4.3 False rejection as a consequence of block merging -- 6.5 Experimental results and discussion -- 6.5.1 Robustness against false rejection -- 6.5.2 Watermark transparency and embedding capacity results -- 6.6 Summary --
505 8 _a5. Addressing implementation issues -- 5.1 Managing auxiliary information -- 5.2 Optimizing false pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation platform -- 5.4.1 Working methodology -- 5.4.2 Viewing plots generated in the past -- 5.5 Summary --
505 8 _a4. Detailed working of a reversible watermarking algorithm: a technique utilizing weighted median-based prediction -- 4.1 Introduction -- 4.2 Watermark embedding algorithm -- 4.2.1 Selection of base pixels -- 4.2.2 Predicting three sets of pixels -- 4.2.3 Computing prediction errors -- 4.2.4 Embedding watermark bits -- 4.2.5 Combining modified errors with predicted pixels -- 4.3 Watermark extraction algorithm -- 4.3.1 Handling of under/overflow -- 4.4 Overhead bits -- 4.5 Varying the error threshold -- 4.6 Experimental results -- 4.6.1 Application to medical and military images -- 4.6.2 Varying the weights of a weighted-median filter -- 4.7 Summary --
505 8 _a3. Overview of state-of-the-art reversible watermarking techniques -- 3.1 Introduction -- 3.2 Difference expansion -- 3.3 Data compression -- 3.4 Histogram-bin-shifting -- 3.4.1 Circular histogram-bin-shifting -- 3.5 Pixel prediction -- 3.5.1 A recent reversible data hiding technique based on pixel prediction -- 3.6 Modification of frequency domain characteristics -- 3.7 Summary --
505 0 _a1. Introduction -- 1.1 Digital watermarking -- 1.2 Fragile and robust watermarking techniques -- 1.3 Reversible digital watermarking -- 1.3.1 Importance of reversible watermarking --
505 8 _a2. Motivational case studies -- 2.1 Investigating the effects of DRM practices on medical images -- 2.1.1 Background -- 2.1.2 Methodology -- 2.1.3 Results -- 2.1.4 Inferences: effect of lossy watermarking scheme on automated malaria diagnosis -- 2.2 Investigating performance in noisy military environment -- 2.2.1 Experimental setup and simulation results -- 2.2.2 Discussion -- 2.2.3 Summary --
506 1 _aAbstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0 _aCompendex
510 0 _aINSPEC
510 0 _aGoogle scholar
510 0 _aGoogle book search
520 3 _aDigital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintain perfect integrity of the original multimedia "cover data." In non-reversible watermarking schemes, after embedding and extraction of the watermark, the cover data undergoes some distortions, although perceptually negligible in most cases. In contrast, in reversible watermarking, zero-distortion of the cover data is achieved, that is the cover data is guaranteed to be restored bit-by-bit. Such a feature is desirable when highly sensitive data is watermarked, e.g., in military, medical and legal imaging applications. This work deals with development, analysis and evaluation of state-of-the-art reversible watermarking techniques for digital images. In this work we establish the motivation for research on reversible watermarking using a couple of case studies with medical and military images.We present a detailed review of the state-of-the-art research in this field.We investigate the various subclasses of reversible watermarking algorithms, their operating principles and computational complexities. Along with this, to give the readers an idea about the detailed working of a reversible watermarking scheme, we present a prediction-based reversible watermarking technique, recently published by us.We discuss the major issues and challenges behind implementation of reversible watermarking techniques, and recently proposed solutions for them. Finally, we provide an overview of some open problems and scope of work for future researchers in this area.
530 _aAlso available in print.
588 _aTitle from PDF title page (viewed on March 15, 2014).
650 0 _aDigital watermarking.
650 0 _aDigital rights management.
653 _adigital rights management
653 _adigital watermarking
653 _alossless data hiding
653 _amultimedia data
653 _areversibility
700 1 _aChakraborty, Rajat Subhra.,
_eauthor.
776 0 8 _iPrint version:
_z9781627053150
830 0 _aSynthesis digital library of engineering and computer science.
830 0 _aSynthesis lectures on information security, privacy, and trust ;
_v# 10.
_x1945-9750
856 4 2 _3Abstract with links to resource
_uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6812574
856 4 0 _3Abstract with links to full text
_uhttp://dx.doi.org/10.2200/S00567ED1V01Y201401SPT010
999 _c562057
_d562057