Multimedia Security:: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property doc

268 467 0
Multimedia Security:: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property Chun-Shien Lu Institute of Information Science Academia Sinica, Taiwan, ROC IDEA GROUP PUBLISHING Hershey • London • Melbourne • Singapore Acquisitions Editor: Senior Managing Editor: Managing Editor: Development Editor: Copy Editor: Typesetter: Cover Design: Printed at: Mehdi Khosrow-Pour Jan Travers Amanda Appicello Michele Rossi Ingrid Widitz Jennifer Wetzel Lisa Tosheff Yurchak Printing Inc Published in the United States of America by Idea Group Publishing (an imprint of Idea Group Inc.) 701 E Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@idea-group.com Web site: http://www.idea-group.com and in the United Kingdom by Idea Group Publishing (an imprint of Idea Group Inc.) Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 3313 Web site: http://www.eurospan.co.uk Copyright © 2005 by Idea Group Inc All rights reserved No part of this book may be reproduced in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher Library of Congress Cataloging-in-Publication Data Multimedia security : steganography and digital watermarking techniques for protection of intellectual property / Chun-Shien Lu, Editor p cm ISBN 1-59140-192-5 ISBN 1-59140-275-1 (ppb) ISBN 1-59140-193-3 (ebook) Computer security Multimedia systems Security measures Intellectual property I Lu, Chun-Shien QA76.9.A25M86 2004 005.8 dc22 2004003775 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library All work contributed to this book is new, previously-unpublished material The views expressed in this book are those of the authors, but not necessarily of the publisher Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property Table of Contents Preface v Chapter I Digital Watermarking for Protection of Intellectual Property Mohamed Abdulla Suhail, University of Bradford, UK Chapter II Perceptual Data Hiding in Still Images 48 Mauro Barni, University of Siena, Italy Franco Bartolini, University of Florence, Italy Alessia De Rosa, University of Florence, Italy Chapter III Audio Watermarking: Properties, Techniques and Evaluation 75 Andrés Garay Acevedo, Georgetown University, USA Chapter IV Digital Audio Watermarking 126 Changsheng Xu, Institute for Infocomm Research, Singapore Qi Tian, Institute for Infocomm Research, Singapore Chapter V Design Principles for Active Audio and Video Fingerprinting 157 Martin Steinebach, Fraunhofer IPSI, Germany Jana Dittmann, Otto-von-Guericke-University Magdeburg, Germany Chapter VI Issues on Image Authentication 173 Ching-Yung Lin, IBM T.J Watson Research Center, USA Chapter VII Digital Signature-Based Image Authentication 207 Der-Chyuan Lou, National Defense University, Taiwan Jiang-Lung Liu, National Defense University, Taiwan Chang-Tsun Li, University of Warwick, UK Chapter VIII Data Hiding in Document Images 231 Minya Chen, Polytechnic University, USA Nasir Memon, Polytechnic University, USA Edward K Wong, Polytechnic University, USA About the Authors 248 Index 253 v Preface In this digital era, the ubiquitous network environment has promoted the rapid delivery of digital multimedia data Users are eager to enjoy the convenience and advantages that networks have provided Meanwhile, users are eager to share various media information in a rather cheap way without awareness of possibly violating copyrights In view of these, digital watermarking technologies have been recognized as a helpful way in dealing with the copyright protection problem in the past decade Although digital watermarking still faces some challenging difficulties for practical uses, there are no other techniques that are ready to substitute it In order to push ahead with the development of digital watermarking technologies, the goal of this book is to collect both comprehensive issues and survey papers in this field so that readers can easily understand state of the art in multimedia security, and the challenging issues and possible solutions In particular, the authors that contribute to this book have been well known in the related fields In addition to the invited chapters, the other chapters are selected from a strict review process In fact, the acceptance rate is lower than 50% There are eight chapters contained in this book The first two chapters provide a general survey of digital watermarking technologies In Chapter I, an extensive literature review of the multimedia copyright protection is thoroughly provided It presents a universal review and background about the watermarking definition, concept and the main contributions in this field Chapter II focuses on the discussions of perceptual properties in image watermarking In this chapter, a detailed description of the main phenomena regulating the HVS will be given and the exploitation of these concepts in a data hiding system will be considered Then, some limits of classical HVS models will be highlighted and some possible solutions to get around these problems pointed out Finally, a complete mask building procedure, as a possible exploitation of HVS characteristics for perceptual data hiding in still images will be described From Chapter III through Chapter V, audio watermarking plays the main role In Chapter III, the main theme is to propose a methodology, including vi performance metrics, for evaluating and comparing the performance of digital audio watermarking schemes This is because the music industry is facing several challenges as well as opportunities as it tries to adapt its business to the new medium In fact, the topics discussed in this chapter come not only from printed sources but also from very productive discussions with some of the active researchers in the field These discussions have been conducted via email, and constitute a rich complement to the still low number of printed sources about this topic Even though the annual number of papers published on watermarking has been nearly doubling every year in the last years, it is still low Thus it was necessary to augment the literature review with personal interviews In Chapter IV, the aim is to provide a comprehensive survey and summary of the technical achievements in the research area of digital audio watermarking In order to give a big picture of the current status of this area, this chapter covers the research aspects of performance evaluation for audio watermarking, human auditory system, digital watermarking for PCM audio, digital watermarking for wav-table synthesis audio, and digital watermarking for compressed audio Based on the current technology used in digital audio watermarking and the demand from real-world applications, future promising directions are identified In Chapter V, a method for embedding a customer identification code into multimedia data is introduced Specifically, the described method, active digital fingerprinting, is a combination of robust digital watermarking and the creation of a collision-secure customer vector There is also another mechanism often called fingerprinting in multimedia security, which is the identification of content with robust hash algorithms To be able to distinguish both methods, robust hashes are called passive fingerprinting and collision-free customer identification watermarks are called active fingerprinting Whenever we write fingerprinting in this chapter, we mean active fingerprinting In Chapters VI and VII, the media content authentication problem will be discussed It is well known that multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels - from signal syntax levels to semantic levels In Chapter VI, several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the Self-Authentication-and-Recovery Image (SARI) system, and a novel technique for image/video authentication in the semantic level will be thoroughly described This chapter provides an overview of these image authentication issues On the other hand, in the light of the possible disadvantages that watermarking-based authentication techniques may result in, Chapter VII has moved focus to labeling-based authentication techniques In labeling-based techniques, the authentication information is conveyed in a separate file called label A label is additional information associated with vii the image content and can be used to identify the image In order to associate the label content with the image content, two different ways can be employed and are stated as follows The last chapter describes watermarking methods applied to those media data that receives less attention With the proliferation of digital media such as images, audio, and video, robust digital watermarking and data hiding techniques are needed for copyright protection, copy control, annotation, and authentication of document images While many techniques have been proposed for digital color and grayscale images, not all of them can be directly applied to binary images in general and document images in particular The difficulty lies in the fact that changing pixel values in a binary image could introduce irregularities that are very visually noticeable Over the last few years, we have seen a growing but limited number of papers proposing new techniques and ideas for binary image watermarking and data hiding In Chapter VIII, an overview and summary of recent developments on this important topic, and discussion of important issues such as robustness and data hiding capacity of the different techniques is presented viii Acknowledgments As the editor of this book, I would like to thank all the authors who have contributed their chapters to this book during the lengthy process of compilation In particular, I truly appreciate Idea Group Inc for giving me the extension of preparing the final book manuscript Without your cooperation, this book would not be born Chun-Shien Lu, PhD Assistant Research Fellow Institute of Information Science, Academia Sinica Taipei City, Taiwan 115, Republic of China (ROC) lcs@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~lcs Digital Watermarking for Protection of Intellectual Property Chapter I Digital Watermarking for Protection of Intellectual Property Mohamed Abdulla Suhail, University of Bradford, UK ABSTRACT Digital watermarking techniques have been developed to protect the copyright of media signals This chapter aims to provide a universal review and background about the watermarking definition, concept and the main contributions in this field The chapter starts with a general view of digital data, the Internet and the products of these two, namely, the multimedia and the e-commerce Then, it provides the reader with some initial background and history of digital watermarking The chapter presents an extensive and deep literature review of the field of digital watermarking and watermarking algorithms It also highlights the future prospective of the digital watermarking INTRODUCTION Digital watermarking techniques have been developed to protect the copyright of media signals Different watermarking schemes have been suggested for multimedia content (images, video and audio signal) This chapter aims to provide an extensive literature review of the multimedia copyright protection It presents a universal review and background about the watermarking definition, concept and the main contributions in this field The chapter consists of four main sections Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited Suhail The first section provides a general view of digital data, the Internet and the products of these two, namely multimedia and e-commerce It starts this chapter by providing the reader with some initial background and history of digital watermarking The second section gives an extensive and deep literature review of the field of digital watermarking The third section reviews digital-watermarking algorithms, which are classified into three main groups according to the embedding domain These groups are spatial domain techniques, transform domain techniques and feature domain techniques The algorithms of the frequency domain are further subdivided into wavelet, DCT and fractal transform techniques The contributions of the algorithms presented in this section are analyzed briefly The fourth section discusses the future prospective of digital watermarking DIGITAL INTELLECTUAL PROPERTY Information is becoming widely available via global networks These connected networks allow cross-references between databases The advent of multimedia is allowing different applications to mix sound, images, and video and to interact with large amounts of information (e.g., in e-business, distance education, and human-machine interface) The industry is investing to deliver audio, image and video data in electronic form to customers, and broadcast television companies, major corporations and photo archivers are converting their content from analogue to digital form This movement from traditional content, such as paper documents, analogue recordings, to digital media is due to several advantages of digital media over the traditional media Some of these advantages are: The quality of digital signals is higher than that of their corresponding analogue signals Traditional assets degrade in quality as time passes Analogue data require expensive systems to obtain high quality copies, whereas digital data can be easily copied without loss of fidelity Digital data (audio, image and video signals) can be easily transmitted over networks, for example the Internet A large amount of multimedia data is now available to users all over the world This expansion will continue at an even greater rate with the widening availability of advanced multimedia services like electronic commerce, advertising, interactive TV, digital libraries, and a lot more Exact copies of digital data can be easily made This is very useful but it also creates problems for the owner of valuable digital data like precious digital images Replicas of a given piece of digital data cannot be distinguished and their origin cannot be confirmed It is impossible to determine which piece is the original and which is the copy It is possible to hide some information within digital data in such a way that data modifications are undetectable for the human senses Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited 246 Chen, Memon & Wong Bhattacharjya, A.K., & Ancin, H (1999) Data embedding in text for a copier system Proceedings of IEEE International Conference on Image Processing, 2, 245-249 Brassil, J., & O’Gorman, L (1996, May) Watermarking document images with bounding box expansion Proceedings of 1st Int’l Workshop on Information Hiding, (pp 227-235) Newton Institute, Cambridge, UK Chotikakamthorn, N (1999) Document image data hiding techniques using character spacing width sequence coding Proc IEEE Intl Conf Image Processing, Japan Cox, I., Kilian, J., Leighton, T., & Shamoon, T (1996, May/June) Secure spread spectrum watermarking for multimedia In R Anderson (Ed.), Proc First Int Workshop Information Hiding (pp 183-206) Cambridge, UK: Springer-Verlag Craver, S., Memon, N., Yeo, B., & Yeung, M (1998, May) Resolving rightful ownership with invisible watermarking techniques: Limitations, attacks, and implications IEEE Journal on Selected Areas in Communications, 16(4), 573-586 Digimarc Corporation http://www.digimarc.com Foley, J.D., Van Dam, A., Feiner, S.K., & Hughes, J.F (1990) Computer graphics: Principles and practice (2nd ed.) Addison-Wesley Fu, M.S., & Au, O.C (2000a, January) Data hiding for halftone images Proc of SPIE Conf On Security and Watermarking of Multimedia Contents II, 3971, 228-236 Fu, M.S., & Au, O.C (2000b, June 5-9) Data hiding by smart pair toggling for halftone images Proc of IEEE Int’l Conf Acoustics, Speech, and Signal Processing, 4, (pp 2318-2321) Fu, M.S., & Au, O.C (2001) Improved halftone image data hiding with intensity selection Proc IEEE International Symposium on Circuits and Systems, 5, 243-246 Holliman, M., & Memon, N (2000, March) Counterfeiting attacks and blockwise independent watermarking techniques IEEE Transactions on Image Processing, 9(3), 432-441 Kacker, D., & Allebach, J.P (2003, April) Joint halftoning and watermarking IEEE Trans Signal Processing, 51, 1054-1068 Katsavounidis, I., & Jay Kuo, C.C (1997, March) A multiscale error diffusion technique for digital half–toning IEEE Trans on Image Processing, 6(3), 483-490 Knox, K.T Digital watermarking using stochastic screen patterns, United States Patent Number 5,734,752 Koch, E., & Zhao, J (1995, August) Embedding robust labels into images for copyright protection Proc International Congress on Intellectual Property Rights for Specialized Information, Knowledge & New Technologies, Vienna Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited Data Hiding in Document Images 247 Liu, Y., Mant, J., Wong, E., & Low, S.H (1999, January).Marking and detection of text documents using transform-domain techniques Proc SPIE Conf on Security and Watermarking of Multimedia Contents, (pp 317-328), San Jose, CA Low, S.H., Lapone, A.M., & Maxmchuk, N.F (1995, November 13-17) Document identification to discourage illicit copying IEEE GlobeCom 95, Singapore Low, S.H., & Maxemchuk, N.F (1998, May) Performance comparison of two text marking methods IEEE Journal on Selected Areas in Communications, 16(4) Low, S.H., Maxemchuk, N.F., Brassil, J.T., & O’Gorman, L (1995) Document marking and identification using both line and word shifting Infocom 95 Los Alamitos, CA: IEEE Computer Society Press Low, S.H., Maxemchuk, N.F., & Lapone, A.M (1998, March) Document identification for copyright protection using centroid detection IEEE Trans on Comm., 46(3), 372-83 Matsui, K & Tanaka, K (1994) Video-steganography: How to secretly embed a signature in a picture Proceedings of IMA Intellectual Property Project, 1(1), 187-206 Maxemchuk, N.F., & Low, S.H (1997, October) Marking text documents Proceedings of IEEE Intl Conference on Image Processing Mei, Q., Wong, E.K., & Memon, N (2001, January) Data hiding in binary text documents SPIE Proc Security and Watermarking of Multimedia Contents III, San Jose, CA Pan, H.-K., Chen, Y.-Y., & Tseng, Y.-C (2000) A secure data hiding scheme for two-color images IEEE Symposium on Computers and Communications Swanson, M., Kobayashi, M., & Tewfik, A (1998, June) Multimedia data embedding and watermarking technologies IEEE Proceedings, 86(6), 1064-1087 Tseng, Y., & Pan, H (2000) Secure and invisible data hiding in 2-color images IEEE Symposium on Computers and Communications Wang, H.-C.A (2001, April 2-4) Data hiding techniques for printed binary images The International Conference on Information Technology: Coding and Computing Wang, S.G Digital watermarking using conjugate halftone screens, United States Patent Number 5,790,703 Wu, M., Tang, E., & Liu, B (2000, July 31-August 2) Data hiding in digital binary images Proc IEEE Int’l Conf on Multimedia and Expo, New York Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited 248 About the Authors About the Authors Chun-Shien Lu received a PhD in Electrical Engineering from the National Cheng-Kung University, Taiwan, ROC (1998) From October 1998 through July 2002, he joined the Institute of Information Science, Academia Sinica, Taiwan, as a postdoctoral fellow for his army service Since August 2002, he has been an assistant research fellow at the same institute His current research interests mainly focus on topics of multimedia and time-frequency analysis of signals and images (including security, networking and signal processing) Dr Lu received the paper award of the Image Processing and Pattern Recognition Society of Taiwan many times for his work on data hiding He organized and chaired a special session on multimedia security in the Second and Third IEEE Pacific-Rim Conference on Multimedia (2001-2002) He will co-organize two special sessions in the Fifth IEEE International Conference on Multimedia and Expo (ICME) (2004) He holds one U.S and one ROC patent on digital watermarking He is a member of the IEEE Signal Processing Society and the IEEE Circuits and Systems Society * * * Andrés Garay Acevedo was born in Bogotá, Colombia, where he studied systems engineering at the University of Los Andes After graduation he pursued a Master’s in Communication, Culture and Technology at Georgetown University, where he worked on topics related to audio watermarking Other research interests include sound synthesis, algorithmic composition, and music information retrieval He currently works for the Colombian Embassy in Washington, DC, where he is implementing several projects in the field of information and network security Mauro Barni was born in Prato in 1965 He graduated in electronic engineering at the University of Florence (1991) He received a PhD in Informatics and Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited About the Authors 249 Telecommunications (October 1995) From 1991 to 1998, he was with the Department of Electronic Engineering, University of Florence, Italy, where he worked as a postdoc researcher Since September 1998, he has been with the Department of Information Engineering of the University of Siena, Italy, where he works as associate professor His main interests are in the field of digital image processing and computer vision His research activity is focused on the application of image processing techniques to copyright protection and authentication of multimedia data (digital watermarking), and on the transmission of image and video signals in error-prone, wireless environments He is author/coauthor of more than 150 papers published in international journals and conference proceedings Mauro Barni is member of the IEEE, where he serves as member of the Multimedia Signal Processing Technical Committee (MMSP-TC) He is associate editor of the IEEE Transactions on Multimedia Franco Bartolini was born in Rome, Italy, in 1965 In 1991, he graduated (cum laude) in electronic engineering from the University of Florence, Italy In November 1996, he received a PhD in Informatics and Telecommunications from the University of Florence Since November 2001, he has been assistant professor at the University of Florence His research interests include digital image sequence processing, still and moving image compression, nonlinear filtering techniques, image protection and authentication (watermarking), image processing applications for the cultural heritage field, signal compression by neural networks, and secure communication protocols He has published more than 130 papers on these topics in international journals and conferences He holds three Italian and one European patent in the field of digital watermarking Dr Bartolini is a member of IEEE, SPIE and IAPR He is a member of the program committee of the SPIE/IST Workshop on Security, Steganography, and Watermarking of Multimedia Contents Minya Chen is a PhD student in the Computer Science Department at Polytechnic University, New York (USA) She received her BS in Computer Science from University of Science and Technology of China, Hefei, China, and received her MS in Computer Science from Polytechnic University, New York Her research interests include document image analysis, watermarking, and pattern recognition, and she has published papers in these areas Alessia De Rosa was born in Florence, Italy, in 1972 In 1998, she graduated in electronic engineering from the University of Florence, Italy In February 2002, she received a PhD in Informatics and Telecommunications from the University of Florence At present, she is involved in the research activities of the Image Processing and Communications Laboratory of the Department of Electronic and Telecommunications of the University of Florence, where she works as a postdoc researcher Her main research interests are in the fields of Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited 250 About the Authors digital watermarking, human perception models for digital image watermarking and quality assessment, and image processing for cultural heritage applications She holds an Italian patent in the field of digital watermarking Jana Dittmann was born in Dessau, Germany She studied Computer Science and Economy at the Technical University in Darmstadt In 1999, she received her PhD from the Technical University of Darmstadt She has been a full professor in the field of multimedia and security at the University of Otto-vonGuericke University Magdeburg since September 2002 Dr Dittmann specializes in the field of Multimedia Security Her research is mainly focused on digital watermarking and content-based digital signatures for data authentication and for copyright protection She has many national and international publications, is a member of several conference PCs, and organizes workshops and conferences in the field of multimedia and security issues She was involved in all of the last five Multimedia and Security Workshops at ACM Multimedia and she has initiated this workshop as a standalone ACM event since 2004 In 2001, she was a co-chair of the CMS2001 conference that took place in May 2002 in Darmstadt, Germany She is an associate editor for the ACM Multimedia Systems Journal and a guest editor for the IEEE Transaction on Signal Processing Journal for Secure Media Dr Dittmann is a member of the ACM and GI Informatik Chang-Tsun Li received a BS in Electrical Engineering from the Chung Cheng Institute of Technology (CCIT), National Defense University, Taiwan (1987), an MS in Computer Science from the U.S Naval Postgraduate School (1992), and a PhD in Computer Science from the University of Warwick, UK (1998) He was an associate professor during 1999-2002 in the Department of Electrical Engineering at CCIT and a visiting professor in the Department of Computer Science at the U.S Naval Postgraduate School in the second half of 2001 He is currently a lecturer in the Department of Computer Science at the University of Warwick His research interests include image processing, pattern recognition, computer vision, multimedia security, and content-based image retrieval Ching-Yung Lin received his PhD from Columbia University Since 2000, he has been a research staff member in the IBM T.J Watson Research Center (USA) His current research interests include multimedia understanding and multimedia security Dr Lin has pioneered the design of video/image content authentication systems His IBM multimedia semantic mining project team performs best in the NIST TREC video semantic concept detection benchingmarking in 2002 and 2003 Dr Lin has led a semantic annotation project, which involves 23 worldwide research institutes, since 2003 He is a guest editor of the Proceedings of IEEE, technical program chair of IEEE ITRE 2003, and chair of Watson Workshop on Multimedia 2003 Dr Lin received the 2003 IEEE Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited About the Authors 251 Circuits and Systems Society Outstanding Young Author award, and is an affiliate assistant professor at the University of Washington Jiang-Lung Liu received a BS (1988) and a PhD (2002), both in Electrical Engineering, from the Chung Cheng Institute of Technology (CCIT), National Defense University, Taiwan He is currently an assistant professor in the Department of Electrical Engineering at CCIT His research interests include cryptology, steganography, multimedia security, and image processing Der-Chyuan Lou received a PhD (1997) from the Department of Computer Science and Information Engineering at National Chung Cheng University, Taiwan, ROC Since 1987, he has been with the Department of Electrical Engineering at Chung Cheng Institute of Technology, National Defense University, Taiwan, ROC, where he is currently a professor and a vice chairman His research interests include cryptography, steganography, algorithm design and analysis, computer arithmetic, and parallel and distributed systems Professor Lou is currently area editor for Security Technology of Elsevier Science’s Journal of Systems and Software He is an honorary member of the Phi Tau Phi Scholastic Honor Society He has been selected and included in the 15th and 18th editions of Who’s Who in the World, published in 1998 and 2001, respectively Nasir Memon is an associate professor in the Computer Science Department at Polytechnic University, New York (USA) He received his BE in Chemical Engineering and MSc in Mathematics from the Birla Institute of Technology, Pilani, India, and received his MS and PhD in Computer Science from the University of Nebraska His research interests include data compression, computer and network security, multimedia data security and multimedia communications He has published more than 150 articles in journals and conference proceedings He was an associate editor for IEEE Transactions on Image Processing from 1999 to 2002 and is currently an associate editor for the ACM Multimedia Systems Journal and the Journal of Electronic Imaging He received the Jacobs Excellence in Education award in 2002 Martin Steinebach is a research assistant at Fraunhofer IPSI (Integrated Publication and Information Systems Institute) His main research topic is digital audio watermarking He studied computer science at the Technical University of Darmstadt and finished his diploma thesis on copyright protection for digital audio in 1999 Martin Steinebach had the organizing committee chair of CMS 2001 and co-organizes the Watermarking Quality Evaluation Special Session at ITCC International Conference on Information Technology: Coding and Computing 2002 Since 2002 he has been the head of the department MERIT Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited 252 About the Authors (Media Security in IT) and of the C4M Competence Centre for Media Security Mohamed Abdulla Suhail received his PhD from the University of Bradford (UK), School of Informatics in Digital Watermarking for Multimedia Copyright Protection Currently, he is working as a project manager for IT and telecommunications projects in an international development bank Having worked for several years in project management, Dr Suhail retains close links with the industry He has spoken at conferences and guest seminars worldwide and is known for his research work in the area of information systems and digital watermarking He has published more than 16 papers in international refereed journals and conferences He also contributed to two books published by international publishers Dr Suhail has received several awards from different academic organizations Qi Tian is a principal scientist in the Media Division, Institute for Infocomm Research (I2R), Singapore His main research interests include image/video/ audio analysis, indexing and retrieval, media content identification and security, computer vision, and pattern recognition He received a BS and an MS from the Tsinghua University in China, and a PhD from the University of South Carolina (USA) All of these degrees were in electrical and computer engineering He is an IEEE senior member and has served on editorial boards of international journals and as chairs and members of technical committees of international conferences on multimedia Edward K Wong received his BE from the State University of New York at Stony Brook, his ScM from Brown University, and his PhD from Purdue University, all in Electrical Engineering He is currently associate professor in the Department of Computer and Information Science at Polytechnic University, Brooklyn, New York (USA) His current research interests include contentbased image/video retrieval, document image analysis and watermarking, and pattern recognition He has published extensively in these areas, and his research has been funded by federal and state agencies, as well as private industries Changsheng Xu received his PhD from Tsinghua University, China (1996) From 1996 to 1998, he was a research associate professor in the National Lab of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences He joined the Institute for Infocomm Research (I2R) of Singapore in March 1998 Currently, he is a senior scientist and head of the Media Adaptation Lab at I2R His research interests include digital watermarking, multimedia processing and analysis, computer vision and pattern recognition He is an IEEE senior member Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited Index 253 Index A active fingerprinting 161 amplitude modification 89 audio restoration attack 101 audio watermarking 75, 164 authentication 233 B bit error rate (BER) 100, 129 bit rate 129 bitstream watermarks 85 Boneh-Shaw fingerprint scheme 161 boundary modifications 239 broadcast monitoring 86 C character features 240 character shifting 236 coalition attack secure fingerprinting 158 collusion attack 103 collusion secure fingerprinting 158 compressed domain watermarking 147 computational complexity 130 content authentication 87 contrast masking 54 contrast masking model 50 contrast sensitivity function 50 copy prevention 233 copyright owner identification 86 copyright protection covert communication 88 customer identification 158 D data hiding 48, 231 digital data digital images 182 digital intellectual property digital rights management (DRM) 128, 234 digital signal quality digital signature-based image authentication 207 digital watermarking 1, 162, 232 digital watermarking application Dither watermarking 90 Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited 254 Index E N e-commerce e-fulfillment e-operations e-tailing echo hiding 136 non-iso-frequency masking 57 non-strict authentication 214 F P false positive rate (FPR) 106 fingerprinting 85, 233 fragile watermarks 85 PCM audio 132 perceptible watermarks 85 perceptual audio quality measure (PAQM) 128 perceptual masking 137 perceptual phenomena 108 phase coding 133 proof of ownership 87 H half-toned images 241 head related transfer function 107 human auditory system (HAS) 107, 130 human visual system (HVS) 50, 207 I image authentication 173 information systems (IS) intellectual property invertibility attack 101 invisible watermarks iso-frequency masking 55 J just noticeable contrast (JNC) 52 L labeling-based techniques 208 low bit coding 132 M mask building 65 masking 54 media signals metadata binding 234 multimedia authentication system 176 music industry 76 O ownership assertion 233 R robust digital signature 179 robust watermarking scheme 14 robust watermarks 85 run-length 241 S Schwenk fingerprint scheme 161 secret keys 84 security 14, 130 signal diminishment attacks 103 signal processing operations 104 signal-to-noise ratio (SNR) 128 spread spectrum coding 134 steganography 4, 232 still images 48 strict authentication 210 T transactional watermarks 87 V video watermarking 165 visible watermarks Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited Index 255 W watermark embedding 8, 60 watermark extraction scheme 146 watermarking 77, 182 watermarking algorithms 163 watermarking classification Copyright © 2005, Idea Group Inc Copying or distributing in print or electronic forms without written permission of Idea Group Inc is prohibited Instant access to the latest offerings of Idea Group, Inc in the fields of I NFORMATION SCIENCE , T ECHNOLOGY AND MANAGEMENT! InfoSci-Online Database BOOK CHAPTERS JOURNAL AR TICLES C ONFERENCE PROCEEDINGS C ASE STUDIES The Bottom Line: With easy to use access to solid, current and in-demand information, InfoSci-Online, reasonably priced, is recommended for academic libraries “ The InfoSci-Online database is the most comprehensive collection of full-text literature published by Idea Group, Inc in: ” - Excerpted with permission from Library Journal, July 2003 Issue, Page 140 n n n n n n n n n Distance Learning Knowledge Management Global Information Technology Data Mining & Warehousing E-Commerce & E-Government IT Engineering & Modeling Human Side of IT Multimedia Networking IT Virtual Organizations BENEFITS n Instant Access n Full-Text n Affordable n Continuously Updated n Advanced Searching Capabilities Start exploring at www.infosci-online.com Recommend to your Library Today! Complimentary 30-Day Trial Access Available! A product of: Information Science Publishing* Enhancing knowledge through information science *A company of Idea Group, Inc www.idea-group.com BROADEN YOUR IT COLLECTION WITH IGP JOURNALS Idea Group Publishing is an innovative international publishing company, founded in 1987, special izing in information science, technology and management books, journals and teaching cases As a leading academic/scholarly publisher, IGP is pleased to announce the introduction of 14 new technology-based research journals, in addition to its existing 11 journals published since 1987, which began with its renowned Information Resources Management Journal Free Sample Journal Copy Should you be interested in receiving a free sample copy of any of IGP's existing or upcoming journals please mark the list below and provide your mailing information in the space provided, attach a business card, or email IGP at journals@idea-group.com Upcoming IGP Journals January 2005 o Int Journal of Data Warehousing & Mining o Int Journal of Enterprise Information Systems o Int Journal of Business Data Comm & Networking o Int Journal of Intelligent Information Technologies o International Journal of Cases on E-Commerce o Int Journal of Knowledge Management o International Journal of E-Business Research o Int Journal of Mobile Computing & Commerce o International Journal of E-Collaboration o Int Journal of Technology & Human Interaction o Int Journal of Electronic Government Research o International Journal of Virtual Universities o Int Journal of Info & Comm Technology Education o Int J of Web-Based Learning & Teaching Tech.’s Established IGP Journals o Annals of Cases on Information Technology o International Journal of Web Services Research o Information Management o Journal of Database Management o Information Resources Management Journal o Journal of Electronic Commerce in Organizations o Information Technology Newsletter o Journal of Global Information Management o Int Journal of Distance Education Technologies o Journal of Organizational and End User Computing o Int Journal of ITStandardsand Standardization Research Name: Affiliation: Address: _ E-mail: Fax: _ Visit the IGI website for more information on these journals at www.idea-group.com/journals/ IDEA GROUP PUBLISHING A company of Idea Group Inc 701 East Chocolate Avenue, Hershey, PA 17033-1240, USA Tel: 717-533-8845; 866-342-6657 • 717-533-8661 (fax) Journals@idea-group.com www.idea-group.com Current Security Management & Ethical Issues of Information Technology Rasool Azari, University of Redlands, California, USA Corporate and individual behaviors are increasingly scrutinized as reports of scandals around the world are frequently becoming the subject of attention Additionally, the security of data and information and ethical problems that arise when enforcing the appropriate security initiatives are becoming prevalent as well Current Security Management & Ethical Issues of Information Technology focuses on these issues and more, at a time when the global society greatly needs to re-examine the existing policies and practices ISBN 1-931777-43-8(s/c) • US$59.95 • eISBN 1-931777-59-4 • 300 pages ã Copyright â 2003 Embracing security management programs and including them in the decision making process of policy makers helps to detect and surmount the risks with the use of new and evolving technologies Raising awareness about the technical problems and educating and guiding policy makers, educators, managers, and strategists is the responsibility of computer professionals and professional organizations.” Rasool Azari University of Redlands, CA It’s Easy to Order! Order online at www.idea-group.com or call 717/533-8845 x10 Mon-Fri 8:30 am-5:00 pm (est) or fax 24 hours a day 717/533-8661 IRM Press Hershey • London • Melbourne • Singapore An excellent addition to your library Information Management: Support Systems & Multimedia Technology George Ditsa University of Wollongong, Australia There is a growing interest in developing intelligent systems that would enable users to accomplish complex tasks in a web-centric environment with relative ease utilizing such technologies Additionally, because new multimedia technology is emerging at an unprecedented rate, tasks that were not feasible before are becoming trivial due to the opportunity to communication with anybody at any place and any time Rapid changes in such technologies are calling for support to assist in decision-making at all managerial levels within organizations Information Management: Support Systems & Multimedia Technology strives to address these issues and more by offering the most recent research and findings in the area to assist these managers and practitioners with their goals ISBN 1-931777-41-1 (s/c); eISBN 1-931777-57-8 • US$59.95 • 300 pages • © 2003 “This is a scholarly and academic book that is focused on the latest research and findings associated with information management in conjunction with support systems and multimedia technology It includes the most recent research and findings, on a mainstream topic that is impacting such institutions worldwide.” –George Ditsa, University of Wollongong, Australia It’s Easy to Order! Order online at www.idea-group.com or call 717/533-8845 x10! Mon-Fri 8:30 am-5:00 pm (est) or fax 24 hours a day 717/533-8661 IRM Press Hershey • London • Melbourne • Singapore An excellent addition to your library New Release! Multimedia Systems and Content-Based Image Retrieval Edited by: Sagarmay Deb, Ph.D University of Southern Queensland, Australia Multimedia systems and content-based image retrieval are very important areas of research in computer technology Numerous research works are being done in these fields at present These two areas are changing our life-styles because they together cover creation, maintenance, accessing and retrieval of video, audio, image, textual and graphic data But still several important issues in these areas remain unresolved and further research works are needed to be done for better techniques and applications Multimedia Systems and Content-Based Image Retrieval addresses these unresolved issues and highlights current research ISBN: 1-59140-156-9; US$79.95 h/c• ISBN: 1-59140-265-4; US$64.95 s/c eISBN: 1-59140-157-7 • 406 pages • Copyright 2004 “Multimedia Systems and Context-Based Image Retrieval contributes to the generation of new and better solutions to relevant issues in multi-media-systems and content-based image retrieval by encouraging researchers to try new approaches mentioned in the book.” –Sagarmay Deb, University of Southern Queensland, Australia It’s Easy to Order! Order online at www.idea-group.com or call 717/533-8845 x10! Mon-Fri 8:30 am-5:00 pm (est) or fax 24 hours a day 717/533-8661 Idea Group Publishing Hershey • London • Melbourne • Singapore An excellent addition to your library ... necessarily of the publisher Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property Table of Contents Preface v Chapter I Digital Watermarking. .. aspects of performance evaluation for audio watermarking, human auditory system, digital watermarking for PCM audio, digital watermarking for wav-table synthesis audio, and digital watermarking for. .. of Intellectual Property Chapter I Digital Watermarking for Protection of Intellectual Property Mohamed Abdulla Suhail, University of Bradford, UK ABSTRACT Digital watermarking techniques have

Ngày đăng: 07/03/2014, 11:20

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan