000 | 06966nam a2200709 i 4500 | ||
---|---|---|---|
001 | 6812574 | ||
003 | IEEE | ||
005 | 20200413152913.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 140315s2014 caua foab 000 0 eng d | ||
020 |
_z9781627053150 _qpaperback |
||
020 |
_a9781627053167 _qebook |
||
024 | 7 |
_a10.2200/S00567ED1V01Y201401SPT010 _2doi |
|
035 | _a(CaBNVSL)swl00403214 | ||
035 | _a(OCoLC)873087913 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aQA76.9.A25 _bN277 2014 |
|
082 | 0 | 4 |
_a005.8 _223 |
090 |
_a _bMoCl _e201401SPT010 |
||
100 | 1 |
_aNaskar, Ruchira., _eauthor. |
|
245 | 1 | 0 |
_aReversible digital watermarking : _btheory and practices / _cRuchira Naskar, Rajat Subhra Chakraborty. |
264 | 1 |
_aSan Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) : _bMorgan & Claypool, _c2014. |
|
300 |
_a1 PDF (xxiii, 106 pages) : _billustrations. |
||
336 |
_atext _2rdacontent |
||
337 |
_aelectronic _2isbdmedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 |
_aSynthesis lectures on information security, privacy, and trust, _x1945-9750 ; _v# 10 |
|
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
500 | _aPart of: Synthesis digital library of engineering and computer science. | ||
500 | _aSeries from website. | ||
504 | _aIncludes bibliographical references (pages 99-104). | ||
505 | 8 | _a7. Looking forward -- Bibliography -- Authors' biographies. | |
505 | 8 | _a6. Reversible watermarking with tamper localization property -- 6.1 Introduction -- 6.2 Necessary background -- 6.3 Tamper localization in reversible watermarking -- 6.3.1 Bound on tamper localization block size -- 6.4 The method of tamper localization -- 6.4.1 Merging of tamper localization unit blocks -- 6.4.2 An application -- 6.4.3 False rejection as a consequence of block merging -- 6.5 Experimental results and discussion -- 6.5.1 Robustness against false rejection -- 6.5.2 Watermark transparency and embedding capacity results -- 6.6 Summary -- | |
505 | 8 | _a5. Addressing implementation issues -- 5.1 Managing auxiliary information -- 5.2 Optimizing false pixel rejection rate -- 5.3 Optimizing runtime requirements -- 5.4 Development of a common evaluation platform -- 5.4.1 Working methodology -- 5.4.2 Viewing plots generated in the past -- 5.5 Summary -- | |
505 | 8 | _a4. Detailed working of a reversible watermarking algorithm: a technique utilizing weighted median-based prediction -- 4.1 Introduction -- 4.2 Watermark embedding algorithm -- 4.2.1 Selection of base pixels -- 4.2.2 Predicting three sets of pixels -- 4.2.3 Computing prediction errors -- 4.2.4 Embedding watermark bits -- 4.2.5 Combining modified errors with predicted pixels -- 4.3 Watermark extraction algorithm -- 4.3.1 Handling of under/overflow -- 4.4 Overhead bits -- 4.5 Varying the error threshold -- 4.6 Experimental results -- 4.6.1 Application to medical and military images -- 4.6.2 Varying the weights of a weighted-median filter -- 4.7 Summary -- | |
505 | 8 | _a3. Overview of state-of-the-art reversible watermarking techniques -- 3.1 Introduction -- 3.2 Difference expansion -- 3.3 Data compression -- 3.4 Histogram-bin-shifting -- 3.4.1 Circular histogram-bin-shifting -- 3.5 Pixel prediction -- 3.5.1 A recent reversible data hiding technique based on pixel prediction -- 3.6 Modification of frequency domain characteristics -- 3.7 Summary -- | |
505 | 0 | _a1. Introduction -- 1.1 Digital watermarking -- 1.2 Fragile and robust watermarking techniques -- 1.3 Reversible digital watermarking -- 1.3.1 Importance of reversible watermarking -- | |
505 | 8 | _a2. Motivational case studies -- 2.1 Investigating the effects of DRM practices on medical images -- 2.1.1 Background -- 2.1.2 Methodology -- 2.1.3 Results -- 2.1.4 Inferences: effect of lossy watermarking scheme on automated malaria diagnosis -- 2.2 Investigating performance in noisy military environment -- 2.2.1 Experimental setup and simulation results -- 2.2.2 Discussion -- 2.2.3 Summary -- | |
506 | 1 | _aAbstract freely available; full-text restricted to subscribers or individual document purchasers. | |
510 | 0 | _aCompendex | |
510 | 0 | _aINSPEC | |
510 | 0 | _aGoogle scholar | |
510 | 0 | _aGoogle book search | |
520 | 3 | _aDigital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintain perfect integrity of the original multimedia "cover data." In non-reversible watermarking schemes, after embedding and extraction of the watermark, the cover data undergoes some distortions, although perceptually negligible in most cases. In contrast, in reversible watermarking, zero-distortion of the cover data is achieved, that is the cover data is guaranteed to be restored bit-by-bit. Such a feature is desirable when highly sensitive data is watermarked, e.g., in military, medical and legal imaging applications. This work deals with development, analysis and evaluation of state-of-the-art reversible watermarking techniques for digital images. In this work we establish the motivation for research on reversible watermarking using a couple of case studies with medical and military images.We present a detailed review of the state-of-the-art research in this field.We investigate the various subclasses of reversible watermarking algorithms, their operating principles and computational complexities. Along with this, to give the readers an idea about the detailed working of a reversible watermarking scheme, we present a prediction-based reversible watermarking technique, recently published by us.We discuss the major issues and challenges behind implementation of reversible watermarking techniques, and recently proposed solutions for them. Finally, we provide an overview of some open problems and scope of work for future researchers in this area. | |
530 | _aAlso available in print. | ||
588 | _aTitle from PDF title page (viewed on March 15, 2014). | ||
650 | 0 | _aDigital watermarking. | |
650 | 0 | _aDigital rights management. | |
653 | _adigital rights management | ||
653 | _adigital watermarking | ||
653 | _alossless data hiding | ||
653 | _amultimedia data | ||
653 | _areversibility | ||
700 | 1 |
_aChakraborty, Rajat Subhra., _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _z9781627053150 |
830 | 0 | _aSynthesis digital library of engineering and computer science. | |
830 | 0 |
_aSynthesis lectures on information security, privacy, and trust ; _v# 10. _x1945-9750 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6812574 |
856 | 4 | 0 |
_3Abstract with links to full text _uhttp://dx.doi.org/10.2200/S00567ED1V01Y201401SPT010 |
999 |
_c562057 _d562057 |