m., m, - home - springer978-0-387-26090...320 references the side information case," ieee...

13
Ahumada, A. J., and Peterson, H. A. "Luminance-model-based DCT quantization for color image compression," in Proc. SPIE, vol. 1660, (1992): 365-374. Arnamo, T., and Misaki, D. "Feature calibration method for watermarking of document images," in Proc. of 5th Intl. Con5 on Document Analysis and Recognition, (1999):9 1-94. Arnold, M., Schmucker, M, and Wolthusen, S.D. "Techniques and Applications of Digital Watermarking and Content Protection", Artech House, (2003). Bell, A.E. "The dynamic digital disk," IEEE Spectrum, vol. 36(10), (October 1999): 28 -35. Bender, W., Gruhl, D., Morimoto, N., and Lu A. "Techniques for Data Hiding," IBM Systems Journal, vol. 35, no. 3&4, (1996): 313-336. Berrou, C. and Glavieux, A. "Near optimum error correcting coding and decoding: turbo-codes," IEEE Transactions on Communications, vol. 44(10), (October 1996): 1261 - 1271. Bloom, J.A., Cox, I.J., Kalker, T., Linnartz, J.-P.M.G.. Miller, M.L., and Traw, C.B.S.; "Copy Protection for DVD Video," in Proc. of the IEEE, vol. 87(7),(July 1999): 1267 - 1276. Boneh, D., and Shaw, J. "Collusion-secure fingerprinting for digital data," IEEE Transactions on Information Theory, vol. 44(5), (September 1998): 1897-1905 Burgett, S., Koch, E., and Zhao, J. "Copyright labeling of digitized image data", IEEE Communications Magazine, vol. 36(3), (March 1998):94- 100. Chen, M., Wong, E.K., Memon, N. and Adams, S. "Recent developments in document image watermarking and data

Upload: vunguyet

Post on 20-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Ahumada, A. J., and Peterson, H. A. "Luminance-model-based DCT quantization for color image compression," in Proc. SPIE, vol. 1660, (1992): 365-374.

Arnamo, T., and Misaki, D. "Feature calibration method for watermarking of document images," in Proc. of 5th Intl. Con5 on Document Analysis and Recognition, (1999): 9 1-94.

Arnold, M., Schmucker, M, and Wolthusen, S.D. "Techniques and Applications of Digital Watermarking and Content Protection", Artech House, (2003).

Bell, A.E. "The dynamic digital disk," IEEE Spectrum, vol. 36(10), (October 1999): 28 -35.

Bender, W., Gruhl, D., Morimoto, N., and Lu A. "Techniques for Data Hiding," IBM Systems Journal, vol. 35, no. 3&4, (1996): 313-336.

Berrou, C. and Glavieux, A. "Near optimum error correcting coding and decoding: turbo-codes," IEEE Transactions on Communications, vol. 44(10), (October 1996): 126 1 - 127 1.

Bloom, J.A., Cox, I.J., Kalker, T., Linnartz, J.-P.M.G.. Miller, M.L., and Traw, C.B.S.; "Copy Protection for DVD Video," in Proc. of the IEEE, vol. 87(7), (July 1999): 1267 - 1276.

Boneh, D., and Shaw, J. "Collusion-secure fingerprinting for digital data," IEEE Transactions on Information Theory, vol. 44(5), (September 1998): 1897- 1905

Burgett, S., Koch, E., and Zhao, J. "Copyright labeling of digitized image data", IEEE Communications Magazine, vol. 36(3), (March 1998): 94- 100.

Chen, M., Wong, E.K., Memon, N. and Adams, S. "Recent developments in document image watermarking and data

References 315

hiding," in Proc. SPIE Con5 4518: Multimedia Systems and Applications N, (August 200 1): 166- 176.

Chen, B., and Sundberg, C.-E.W. "Digital audio broadcasting in the FM band by means of contiguous band insertion and pre-canceling techniques," IEEE Transactions on Communications, vol. 48(10), (October 2000): 1634 - 1637.

Chen, B., and Wornell, G.W. "An information-theoretic approach to the design of robust digital watermarking systems," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, (March 1999): 206 1 - 2064.

Chen, B., and Wornell, G.W. "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47(4), (May 200 1): 1423 - 1443.

Chou, J., Pradhan, S.S., El Ghaoui, L., and Ramchandran, K.; "Watermarking based on duality with distributed source coding and robust optimization principles," in Proc. of Intl. Conference on Image Processing, vol. 1, (September 2000): 585- 588

Costa, M. "Writing on dirty paper," IEEE Transactions on Information Theory, vol. 29(3) , (May 1983): 439 -441.

Cox, I.J.; Miller, M.L.; Bloom, J.A., "Digital Watermarking," Academic Press, Morgan Kaufmann, (200 1).

Cox, I.J., Kilian, J., Leighton, F.T., and Shamoon, T. "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6( 12), (December 1997): 1673 - 1687.

Cox, I.J . , and Linnartz, J.-P.M.G. "Some general methods for tampering with watermarks," IEEE Journal on Selected Areas in Communications, vol. 16(4), (May 1998): 587 -593.

Cox, I.J., and Miller, M.L. "Electronic watermarking: the first 50 years," IEEE Fourth Workshop on Multimedia Signal Processing, (October 200 1): 225-230.

Cox, I.J . , Miller, M.L., and McKellips, A.L. "Watermarking a s communications with side information," in Proc. of the IEEE, V O ~ . 87(7), (July 1999): 1127-1141.

316 References

Craver, S., Memon, N., Yeo, B.-L., and Yeung, M.M.; "Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications," IEEE Journal on Selected Areas in Communications, vol. 16(4), (May 1998): 573 - 586.

Craver, S., Memon, N., Boon-Lock Yeo, and Yeung, M.M. "On the invertibility of invisible watermarking techniques," in Proc. of lntl. Conference on Image Processing, vol. 1, (October 1997): 540 -543.

Craver, S.A., Wu, M., and Liu, B. "What can we reasonably expect from watermarks?," IEEE Workshop on the Applications of Signal Processing to Audio and Acoustics, (October 2001): 223 -226.

Decker, S. "Engineering considerations in commercial watermarking," IEEE Communications Magazine, vol. 39(8), (August 2001): 128 -133.

Depovere, G., Kalker, T., and Linnartz, J.-P.; "Improved watermark detection reliability using filtering before correlation," in Proc. of Intl. Conference on Image Processing, vol. 1 , (October 1998): 430-434.

Deseilligny, M. Pierrot, and Le Men, H. "An algorithm for digital watermarking of binary images, application to map and text images," IGN/DT/MATIS, France.

Dugelay, J.-L., and Roche, S. "Fractal transform based large digital watermark embedding and robust full blind extraction," in Proc. of lEEE Intl. Conference on Multimedia Computing and Systems, vol. 2, (June 1999): 1003- 1004.

Eggers, J.J., Bauml, R., Tzschoppe, R., and Girod, B. "Scalar Costa Scheme for Information Hiding", IEEE Transactions on Signal Processing, vol. 5 1, no. 4, (April 2003).

Eggers, J.J., Su, J.K., and Girod, B.; "Robustness of a blind image watermarking scheme," in Proc. of 2000 Intl. Conference on Image Processing, vol. 3, (September 2000): 17-20.

Fisher, R. A., and Yates, F. Statistical Tables, London, 1938. Example 12.

References 3 17

Franti, P. and Ageenko, E.I. "On the use of context tree for binary image compression," in Proc. KIP, (October 1999): 752- 756.

Fridrich, J. "Robust bit extraction from images," IEEE International Conference o n Multimedia Computing and Sys t ems , V O ~ . 2, (1999.): 536 -540.

Friedman, G.L., "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image," IEEE Transaction o n Consumer Electronics, vol. 39, no. 4, (November 1993): 905- 910.

Fu, M.S. and Au, O.C. "Data Hiding Watermarking for Half- tone Images," IEEE Transactions o n Image Processing, vol. 11, no. 4, (April 2002): 477-484.

Furht, B., and Muharemagic, E. 'Multimedia Security: Watermarking Techniques," IEC Comprehensive Report o n Information Security, International Engineering Consortium, Chicago, IL, (2003).

Funk, W. and Schmucker, M. "High Capacity Information Hiding in Music Scores," in Proc. of First Intl. Conf. o n WEB Delivering of Music (Wedelmusic 2001), Florence, Italy, (November 2001): 12- 19.

Hartung, F., and Girod, B. "Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain," in Proc. of the IEEE Intl. Conference o n Acoustics, Speech and Signal Processing, vol. 4, (April 1997): 262 1-2624.

Hartung, F., and Kutter, M. "Multimedia watermarking techniques," i n Proc. of the IEEE, vol. 87(7), (1999.): 1079 - 1 107.

Hel-Or, H. 2. "Watermarking and Copyright Labeling of Printed Images," Journal of Electronic Imaging, vol. 10, no. 3, (2001): 794-803.

Katzenseisser, S., and Petitcolas, F.A.P. Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Boston-London, (2000).

Kim, H.Y. and Afif, A. "Secure Authentication Watermarking for Binary Images," in Prec. of the XVI Brazilian Symposium o n Computer Graphics and Image Processing, (SIBGRAPI 2003).

3 18 References

Kirovski, D.; Malvar, H.; "Robust spread-spectrum audio watermarking," Proceedings of 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing, Volume: 3, May 200 1, Pages: 1345 - 1348

Knuth, D. E. The Art of Computer Programming, vol. 2, 3 r d ed., Section 3.4.2, Algorithm P, page 145. Addison-Wesley, (1997).

Koch, E. and Zhao, J. "Embedding robust labels into images for copyright protection", in Proc. Intl. Congress on Intellectual Property Rights for Specialized Information, Knowledge & New Technologies, Vienna, (Aug. 1995).

Kolchin, V.F., Sevastyanov, B .A. and Chistyakov, V. P. Random Allocation, V.H. Winston & Sons, ( 1978).

Kutter, M, and Petitcolas, F.A.P. "A Fair Benchmark for Image Watermarking Systems," in Proc. On SPIE in Security and Watermarking of Multimedia Contents, (January 1999.): 226- 239.

Langelaar, G.C., Setyawan, I., and Lagendijk, R.L.; "Watermarking digital image and video data. A state-of- the-art overview," IEEE Signal Processing Magazine, vol. 17(5), (September 2000): 20-46.

Liu Y.W and Smith, J.O. "Multiple watermarking: I s power sharing better than time sharing?," Center for Computer Research in Music and Acoustics, Stanford, CA

Lu C.S. and Liao, H.Y.M. "Multipurpose watermarking for image authentication and protection," IEEE Transactions on ImageProcessing, vol. 10, no. 10, (2001): 1579-1592

Lu, H. Wang, J. Kot, A.C. and Shi, Y.Q "An objective distortion measure for binary document images based on human visual perception," in Proc. Int. Conf. on Pattern Recognition, vol. 4, (August 2002): 239-242.

Matsui, K. and Tanaka, K. "Video-steganography: how to secretly embed a signature in a picture," in Proc. IMA Intellectual Property Project, vol. 1, no. 1, (1994): 245-249.

Maxemchuk, N.F. and Low, S.H. "Marking text documents," in Proc. IEEE Intl. Conf. on Image Processing, (October 1997).

Mei, Q. , Wong, E.K., and Memon, N. "Data hiding in binary text documents," in Proc. SPIE Conf.: Security and

References 319

Watermarking of Multimedia Contents III, (January 200 1): 166- 176.

Mintzer F. and Braudaway, G. "If one watermark is good, are more better?," in Proc. Int. Cont on Acoustics, Speech, Signal Processing (ICASSP), vol. 4, (March 1999): 2067-2069.

Moulin, P., and O'Sullivan, J.A. "Information-theoretic analysis of information hiding," IEEE Transactions on Information Theory, vol. 49(3), (March 2003): 563-593.

Muharemagic, E., and Furht, B. "Survey of Watermarking Techniques and Applications", in Multimedia Security Handbook, CRC Press, (2004).

Nikolaidis, A., Tsekeridou, S., Tefas, A., and Solachidis, V. "A survey on watermarking application scenarios and related attacks," in Proc. of 2001 Intl. Conference on Image Processing, vol. 3, (October 2001): 991-994.

O'Ruanaidh, J.J.K., and Pun, T. "Rotation, scale and translation invariant digital image watermarking," in Proc. of Intl. Conference on Image Processing, vol. 1, (October 1997): 536 -539.

Petitcolas, F.A.P. "Watermarking schemes evaluation," IEEE Signal Processing Magazine, vol. 17(5), (September 2000): 58 - 64.

Pitas, I. "A method for signature casting on digital images," in Proc. of Intl. Conference on Image Processing, vol. 3, (1996.): 215 -218.

Piva, A., Barni, M., Bartolini, F., and Cappellini, V.; "DCT- based watermark recovering without resorting to the uncorrupted original image," in Proc. of Intl. Conference on Image Processing, vol. 1, (October 1997): 520 -523.

Podilchuk, C.I., and Delp, E. J. "Digital watermarking: algorithms and applications," IEEE Signal Processing Magazine, V O ~ . 18(4), (July 2001): 33-46.

Podilchuk, C.I., and Wenjun Zeng; "Image-adaptive watermarking using visual models," IEEE Journal on Selected Areas in Communications, vol. 16(4), (May 1998): 525-539.

Pradhan, S.S., Chou, J., and Ramchandran, K. "Duality between source coding and channel coding and its extension to

320 References

the side information case," IEEE Transactions o n Information Theory, vol. 49(5) , (May 2003): 1181-1203.

Ramkumar, M., Akansu, A.N., and Alatan, A.A. "A robust data hiding scheme for images using DFT," in Proc. of 1999 Intl. Conference o n Image Processing, vol. 2, (October 1999): 2 11- 215.

Ruanaidh, J.J.K.O., Dowling, W.J., and Boland, F.M.; "Phase watermarking of digital images" i n Proc. of Intl. Conference o n Image Processing, vol. 3, (September 1996): 239 -242.

Tewfik, A.H.; "Digital watermarking," IEEE Signal Processing Magazine, vol. 17(5), (September 2000): 17- 18.

Tseng, Y.C., and Pan, H.K. "Data Hiding in 2-Color Images," IEEE Transactions o n Computers, vol. 5 1, no. 7, (July 2002).

Wang, Z., and Bovik, A.C. "A Universal Image Quality Index," IEEE Signal Processing Letters, vol. 9(3), (2002) : 8 1-84.

Watson,A.B. "DCT Quantization Matrices Optimized for Individual Images," in SPIE Proc. on Human Vision, Visual Processing, and Digital Display IV, (1993).

Wenjun Zeng, and Liu, B. "On resolving rightful ownerships of digital images by invisible watermarks," in Proc. of Intl. Conference o n Image Processing, vol. 1, (1997): 552 -555.

Wenwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. "Multiresolution watermarking for images and video: a unified approach," in Proc. of 1998 Intl. Conference o n Image Processing, vol. 1, (October 1998): 465-468.

Wolfgang, R.B., and Delp, E.J. "A watermark for digital images," in Proc. of Intl. Conference o n Image Processing, vol. 3, (1996): 219 -222.

Wolfgang, R.B., Podilchuk, C.I., and Delp, E.J. "Perceptual watermarks for digital images and video," in Proc. of the IEEE, V O ~ . 87(7), (July 1999): 1 108- 1 126.

Wong, P.H.W. and Au, O.C. "A capacity estimation technique for JPEG-to-JPEG image watermarking", IEEE Transactions o n Circuits and Sys t ems for Video Technology, vol. 13(8) , (August 2003): 746 -752.

References 32 1

Wong, P.W. "Image Quantization, Half-toning, and Printing," in Handbook of Image & Video Processing, Editor A1 Bovik, Academic Press, (2000).

Wu M., and Liu, B. "Watermarking for image authentication," in Proc. IEEE Int. Conf. on Image Processing, (ICIP 1998).

Wu M., and Liu, B. "Data hiding in image and video: Part I - Fundamental Issues and Solutions," IEEE Transactions on Image Processing, vol. 12, no. 6, (June 2003).

Wu, M., Yu H., and Liu, B. "Data hiding in image and video: Part I1 - Designs and Applications," IEEE Transactions on Image Processing, vol. 12, no 6, (June 2003).

Wu, M., Tang, E., and Liu, B. "Data hiding in digital binary images," in Proc. IEEE Int'l Conf. on Multimedia and Expo, (August 2000).

Index

adaptive image partitioning, 275 adaptive random permutation, 273 adaptive two-level watermarking, 301 Advanced Encryption Standard

(AES), 63 Aegis. See Maples-Spanos Algorithm AES decryption algorithm, 69 AES encryption algorithm, 67 AES key expansion algorithm, 64 affine ciphers, 32 ambiguity attack, 205 Analog Protection System (APS),

203 audio cryptography, 176 audio encryption by Servetti, et al,

157 audio encryption by Thorwirth et al,

156 audio quality layers, 156 audiovisual cryptography, 182 authentication, 7, 37

Baker map, 1 10 benchmarking, 241 binary images, watermarking, 243 blind detector, 212, 224 block cipher, 42 block pixel statistics manipulation,

277 boundary modification, 247 broadcast monitoring, 207 brute force attack, 38

cat map, 1 14 certimark, 246 Chaotic Key-Based Algorithm

(CKBA), 106 checkmark, 245 Cheng-Li Algorithm I, 93 Cheng-Li Algorithm 11, 99 Chen-Mao-Chui Algorithm, 1 15 chosen-ciphertext attack, 38 chosen-plaintext attack, 38 cipher-block chaining, 42 ciphertext-only attack, 38 CKBA. See Yen-Guo Algorithm classes of watermarking applications,

203 classification of watermarking

applications, 200 classification of watermarking

systems, 232 confidentiality, 7, 37 constant bitrate requirement, 28 Constant Embedding Rate (CER),

272 constructive interference, 176 content authentication, 206 content database, 3, 4 content information database, 3 ,4 content packager, 3 , content protection solutions, 10 Content Protection System

Architecture, 3 Content Scramble System (CSS), 11,

205 content server, 3

Index

content-controlled programmable risk-management approaches, 10

conventional cryptosystem, 23 copy control, 7 copy protection, 203 copyright protection, 201 Copyright Protection Technical

Working Group (CPTWG), 15 Copy Control Management System

CCMS), 204 cover work, 21 1 CPRM (Content Protection for

Recordable Media), 12 CPRM-compliant playing device, 13

D

data embedding, 270 data embedding rate, 27 1 Data Encryption Standard (DES), 53 DCT domain technique,

watermarking, 2 18 deficiencies, 245 degradation, 26 DES encryption algorithm, 56 DES key schedule algorithm, 57 destructive interference, 176 DFT domain, watermarking, 22 1 DHQ audios secret sharing scheme,

176 Diffie-Hellman key exchange

protocol, 77 digital signature, 209 Digital Audio-visual Council, 15 Digital rights management (DRM), 3 Digital Video Broadcasting Project,

16 digital watermarking, 2 1 1, 2 13, 3 17 direct message coding, 23 1 discrete cosine transform, 2 18 discrete Fourier transform, 220, 224 discrete wavelet transform, 99,22 1

Distance-Reciprocal Distortion Measure (DRDM), 260

distortion measure, 258 distortion metric, 242 dither matrix, 248 document images, 244 DRM architecture, 3 , 4 DRM controller, 5 DRM reference architecture, 3 Droste's algorithm, 17 1 DVD copy protection system, 204 DVD Forum, 15

electronic codebook, 42 ElGamal decryption algorithm, 76 ElGamal encryption algorithm, 75 ElGamal key generation algorithm,

74 ElGamal Public-Key Cryptosystem,

74 embedding distortion, 2 1 1 embedding one bit in spatial domain,

213 end-to-end content protection

systems, 9 end-to-end validation, 9 Error Correction Coding (ECC), 275 error-resilience. See error-tolerance error-tolerance, 29 evaluation of watermarking systems,

235

facsimile images, 247 false negative error, 2 15 false positive error, 2 15 fidelity, 236 fingerprinting, 205

Index

fixed image partitioning, 247 format compliance, 28 Fourier-Mellin transform, 22 1,225 fragile mark, 199, 258, 260, 287,

290,292,293,294,299,301,304, 305,306,307,311,312,314

fragile watermarks, 209 frequency sensitivity, 228 Fridrich algorithm, 110

half-tone images, 248 hash functions, 47 HDCP license, 13 hierarchical subband decomposition,

99 High-bandwidth Digital Content

Protection (HDCP), 13

IDEA encryption algorithm, 60 IDEA key schedule algorithm, 61 image encryption algorithms, 79 image partitioning, 263 imperceptibility, 236 informed coding, 227 informed detector, 2 1 1 informed embedding, 223 International Data Encryption

Algorithm, 59

Just Noticeable Difference (JND), 236

Kerckhoffs' principle, 39 known-plaintext attack, 38 Koch embedding, 254

lattice codes, 232 leaf ordering, 98 levels of security 25 License Generator, 5 License Server, 4 , 5 linear correlation, 2 16 loss of contrast, 165 luminance masking, 241

Maples-Spanos algorithm, 127 Mean Squared Error (MSE), 259 Media Key Block, 12 Meyer-Gadegast algorithm, 124 MHT-encryption, 143 modification of half-tome images,

247 MPG video compression, 122 multi bit payload, 23 1 multi-bit watermarking, 235 multilevel watermarks, 28 1 MVEA. See Shi-Wang-Bhargava

Algorithm I11

na'ive approach, 20,2 1 near-constant bitrate, 29 non-repudiation, 37

Index

one-time pad, 46 Open Platform Initiative for

Multimedia Access, 15 ordered dithering, 252

Patchwork watermarking, 2 17 Peak Signal-to-Noise Ratio (PSNR),

259 perceptual models, 225, 227 Podesser-Schmidt-Uhl algorithm, 85 Point-to-point content protection

system, 8 prefix binary code, 180 private (symmetric) key

cryptosystems, 40 private Huffman table index, 159 public-key cryptosystems, 41 pyramid decomposition, 99

Q Qiao-Nahrstedt algorithm, 129 Quadtree, 95 Quadtree compression of images, 94 quantization index modulation, 229

rail fence cipher, 32 refinement bits, 147 RSA decryption algorithm, 73 RSA encryption algorithm, 72 RSA key generation algorithm, 7 1 RSA Public-Key Cryptosystem, 7 1 run length coding, 250 RVEA. See Shi-Wang-Bhargava

Algorithm IV

scrambling, 26 SECMPEG. See Meyer-Gadegast

Algorithm secret sharing scheme, 163 Secure Digital Music Initiative's, 15 secure group communication, 36 Security Provider, 12 Self-Protecting Digital Content

(SPDC), 13 selective encryption., 20 self-synchronizing stream ciphers, 45 semantic features set, 34 semi-fragile watermarks, 2 10 sensitivity table, 241 Shi-Wang-Bhargava Algorithm I, 92 Shi-Wang-Bhargava Algorithm 11,

133 Shi-Wang-Bhargava Algorithm 111,

136 Shi-Wang-Bhargava Algorithm IV,

138 side information, 227 significance bits, 147 SNDM pixel scoring, 285 Socek-Magliveras audio

cryptography schemes, 180 spatial selectivity, 1 19 speech and audio encryption, 153 speech encryption by Servetti and De

Martin, 154 SPIHIT encoding algorithm, 103 SP-Network. See Substitution-

Permutation Network spread spectrum technique,

watermarking, 2 18 steganography, 38 stirmark, 245 stream cipher, 44 Structural Neighborhood Distortion

Measure (SNDM), 261 substitution ciphers, 32

Index

Substitution-Permutation Network, 32

Synchronous stream ciphers, 45 syntax-awareness. See format

compliance

Tang algorithm, 88 threshold scheme. See secret sharing

scheme traitor tracing. See fingerprinting transform domain, watermarking, 2 17 transaction tracking. See

fingerprinting transcodability. See format

compliance transform domain, 220 transparency. See format compliance trustworthy digital camera, 209 two alternative, forced choice test,

240 two-level marks, 255,283

uniform quantization, 275, 293 Universal Image Quality Index

(UIQI), 239

Van Droogenbroeck-Benedett Algorithm I, 79

Van Droogenbroeck-Benedett Algorithm 11, 82

variable encryption, 122 VEA. See Shi-Wang-Bhargava

Algorithm 11, See Qiao-Nahrstedt Algorithm

Vernam cipher, 46

video encryption algorithms, 12 1 visual audio sharing, 163 visual cryptography, 164 visual secret sharing, 163

watermark and cover merging, 233 watermark detection, 234 watermark detector, 2 1 1 watermark embedder, 2 1 1 watermark embedding, 233 watermark perceptibility, 236 Watson's model, 237 wavelet domain, watermarking, 220 Wedelmusic technique, 253 workspace domain, 234 Writing on Dirty Paper, 227 Wu-Kuo Algorithm I, 144 Wu-Kuo Algorithm 11, 145

Y

Yen-Guo Algorithm (CKBA), 106

Zeng-Lei Algorithm I, 146 Zeng-Lei Algorithm 11, 149 zerotree, 10 1 zerotree wavelet compression, 99