• Complain

Mohammad Ali Nematollahi - Digital Watermarking: Techniques and Trends

Here you can read online Mohammad Ali Nematollahi - Digital Watermarking: Techniques and Trends full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: Springer, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Mohammad Ali Nematollahi Digital Watermarking: Techniques and Trends

Digital Watermarking: Techniques and Trends: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Digital Watermarking: Techniques and Trends" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field.

Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

Mohammad Ali Nematollahi: author's other books


Who wrote Digital Watermarking: Techniques and Trends? Find out the surname, the name of the author of the book and a list of all author's works by series.

Digital Watermarking: Techniques and Trends — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Digital Watermarking: Techniques and Trends" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Springer Science+Business Media Singapore 2017
Mohammad Ali Nematollahi , Chalee Vorakulpipat and Hamurabi Gamboa Rosales Digital Watermarking Springer Topics in Signal Processing 10.1007/978-981-10-2095-7_1
1. Preliminary on Watermarking Technology
Mohammad Ali Nematollahi 1 , Chalee Vorakulpipat 1 and Hamurabi Gamboa Rosales 2
(1)
National Electronics and Computer Technology Center (NECTEC), Pathumthani, Thailand
(2)
Universidad Autnoma de Zacatecas, Zacatecas, Mexico
Mohammad Ali Nematollahi
Email:
1.1 Overview
A recent development in communication technology, storage device, and digital recording has created an Internet environment with the ability to distribute, duplicate, obtain, and replicate digital media without any quality lossless. However, this technology advancement is worrying multimedia content publishing industries due to unauthorized access through digital media content which is requiring a serious and immediate protection for Intellectual Property Rights. Although a traditional cryptography approach can apply to prevent an unauthorized party to access a digital media content by encrypting the content of the media, cryptography technology has some limitations to fully protect the Intellectual Property Rights. Therefore, it is obvious that other technology should be applied to construct the Intellectual Property Rights, track the digital media content, and provide the digital media content authentication which ensure authorized access and prevent illegal manipulation to the content of digital media. As an effective solution, Digital Watermarking is applying to facilitate the requirements for protecting the Intellectual Property Rights of a digital media. Currently, digital watermarking is becoming the hot topic for the research communities that actively working on this industry. The idea of digital watermarking is the hiding information about digital content as a metadata within digital content to protect the ownership. Probably, this idea is invented in Germany due to a German term wassermark is available that means effect of water on paper [].
Apart from the basic concepts in data hiding, this book is attempting to cover recent and practical applications of digital watermarking in all computer science fields in order to provide an overview on different roles of digital watermarking in computer science. Figure shows the main branch in data-hiding technology. It presents the main focus of this book to narrow down the constraints in the field of data hiding. As shown, each chapter of this book is dedicated to an application of digital watermarking in order to provide a deep and comprehensive overview on major digital watermarking technology.
Fig 11 Book focus in the field of data hiding 12 Fundamentals of - photo 1
Fig. 1.1
Book focus in the field of data hiding
1.2 Fundamentals of Digital Watermarking
The art of watermarking is hiding extra information (which could be an image logo, text message, and raw watermark bits) inside the content of the host objects such as images, audio signals, speech signals, 3D graphical objects, videos, texts, software codes, network streams, XML data, and ontologies without serious degradation on the quality of the objects. The watermark must be detectable from the watermarked content even when intentional and unintentional manipulations have been conducted on the digital watermarked content. Therefore, digital watermarking can be expressed by two main processes: watermark embedding and watermark extraction, which are illustrated in Fig..
Fig 12 Concept of digital watermarking The watermarking processes can be - photo 2
Fig. 1.2
Concept of digital watermarking
The watermarking processes can be described formally. For creating a watermarked cover W C, a watermark data W should be embedded into a cover object O c. As a result, watermark distortion is defined by the deference between O c and W C. Usually, the raw watermark data W is encoded by using a secret key K in order to improve the security and decrease the watermark payload P. Then, a modulated/scaled watermark method W M is used to embed watermark bits into the cover object O c with minimum embedding distortion to provide enough imperceptibility. After embedding the watermark, the watermarked cover W C may be imposed to intentional and unintentional manipulations such as conversions, compression, noise, adding, removing, and editing which would change it to manipulated watermarked cover Picture 3 . The amount of degradation can be computed by finding the deference between Picture 4 and W C which may be considered as noise of the environment.
Detection of the watermark is done based on the received manipulated watermarked cover Picture 5 and the watermark key K . There are two major approaches for watermark detection: The first one is informed detector (non-blind) approach that requires original cover work O c, and the second one is oblivious detector (blind) approach which extracts watermark only from manipulated watermarked cover Picture 6 without any knowledge of the original cover O c. Thus, digital watermarking can be categorized based on source and extraction module into three main classes:
  1. (a)
    Blind watermarking that detects the watermark without the original cover O c. However, in some applications, key K uses are required for generating random sequences.
  2. (b)
    Semi-blind watermarking that detects the watermark with using some information about the original cover O c. For example, it should access to the published watermarked signal that is the original signal after just adding the watermarks.
  3. (c)
    Non-blind watermarking that detects the watermark using the original cover O c and manipulated watermarked cover Picture 7 together.
There is always possibility to categorize the watermarking techniques based on various factors. With respect to robustness, the watermarking methods can be divided into three main groups:
  1. (a)
    Robust digital watermarking that detects the watermark even under serious and malicious manipulation.
  2. (b)
    Semi-fragile digital watermarking that detects the watermark just under unintentional manipulation.
  3. (c)
    Fragile digital watermarking that detects the watermark only if no intentional and unintentional manipulations are took place. This type of watermark is needed for paper of bank notes. These watermarks do not survive any kind of copying and can be used to indicate the bills authenticity. Reaching for fragility is more difficult than robustness.
1.3 Requirements of Digital Watermarking
Basically digital watermarking can be considered as a tradeoff problem due to the nature of digital watermarking which is competing among payload, transparency, robustness, and security. Depending on various and wide applications of the digital watermarking, the watermarking system is designed based on these requirement and system inherent properties. Figure illustrates the requirements of digital watermarking. As shown, these requirements oppose one another and to make them meet is difficult. Within this magic triangle, the mode of operation of a particular watermarking system can be set. For example, a high data rate system may enhance its rate by lowering the robustness at the same moment.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Digital Watermarking: Techniques and Trends»

Look at similar books to Digital Watermarking: Techniques and Trends. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Digital Watermarking: Techniques and Trends»

Discussion, reviews of the book Digital Watermarking: Techniques and Trends and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.