references - home - springer978-0-387-21754...[45j j. song: optimal rate allocation and security...

26
References [ References on Mathematics and Algorithmic Foundations] [1] W. Feller: An Introduction to Probability Theory and Its Applications, voLl, 3rd Ed. revised print, John Wiley & Sons, 1970. [2] D.E. Knuth: The Art of Computer Programming, vol. 2, 3rd Ed., Addison-Wesley, 1997. [3] V.F.Kolchin, B.A.Sevastyanov, V.P. Chistyakov: Random Allocation, V. H.Winston & Sons, 1978. [4] R. Sedgewick: Algorithms in C, Addison-Wesley, 1990. [ References on Communications] [5] R. E. Blahut: Theory and Practice of Data Transmission Codes, 2nd Edition (draft), 1997. [6] T.M. Cover, J.A. Thomas: Elements of Information Theory, 2nd Ed., John-Wiley & Sons, 1991. [7] H.V. Poor: Introduction to Detection and Estimation, 2nd Ed., Springer-Verlag, 1994. [8] J.G. Proakis: Digital Communications, 3rd Ed., McGraw-Hill, 1995. [9] A.S. Tanenbaum: Computer Networks, 3rd Edition, Prentice Hall, 1996.

Upload: dangdang

Post on 20-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

References

[ References on Mathematics and Algorithmic Foundations]

[1] W. Feller: An Introduction to Probability Theory and Its Applications, voLl, 3rd Ed. revised print, John Wiley & Sons, 1970.

[2] D.E. Knuth: The Art of Computer Programming, vol. 2, 3rd Ed., Addison-Wesley, 1997.

[3] V.F.Kolchin, B.A.Sevastyanov, V.P. Chistyakov: Random Allocation, V. H.Winston & Sons, 1978.

[4] R. Sedgewick: Algorithms in C, Addison-Wesley, 1990.

[ References on Communications]

[5] R. E. Blahut: Theory and Practice of Data Transmission Codes, 2nd Edition (draft), 1997.

[6] T.M. Cover, J.A. Thomas: Elements of Information Theory, 2nd Ed., John-Wiley & Sons, 1991.

[7] H.V. Poor: Introduction to Detection and Estimation, 2nd Ed., Springer-Verlag, 1994.

[8] J.G. Proakis: Digital Communications, 3rd Ed., McGraw-Hill, 1995.

[9] A.S. Tanenbaum: Computer Networks, 3rd Edition, Prentice Hall, 1996.

194 References

[10] S. Verdu: Multiuser Detection, Cambridge University Press, 1998.

[References on Multimedia Signal Processing and Coding]

[11] R.N. Bracewell: The Fourier Transform and Its Applications, McGraw-Hill, 1986.

[12] KR. Castleman: Digital Image Processing, Prentice Hall, 1996.

[13] ITU Telecommunication Standardization Sector (ITU-T): Video Cod­ing Experts Group (VCEG), http://www.tnt.uni-hannover.de/ project/ vcegj.

[14] A.K Jain: Fundamentals of Digital Image Processing, Prentice Hall, 1989.

[15] JBIG Committee: ISO Final Committee Draft (FCD) 14492 for JBIG2 Standard, July 1999.

[16] Joint Photographic Experts Group (JPEG), http:/ / www.jpeg.org .

[17] J.S. Lim, A.V. Oppenheim (Eds.): Advanced Topics in Signal Process­ing, Prentice Hall, 1988.

[18] Mathworks, Inc: Documentation of Matlab 5.3, http:// www. math works.com , 2000.

[19] J.L. Mitchell, W.B. Pennebaker, C.E. Fogg (Eds): MPEG Video: Com­pression Standard, Digital Multimedia Standards Series, Chapman & Hall, 1996.

[20) Moving Picture Experts Group (MPEG), http://www.cselt.it/ mpeg/.

[21) MPEG Points and Resources, http:// www.mpeg.org .

[22) S.J. Orfanidis: Introduction to Signal Processing, Prentice Hall, 1996.

[23) G. K Wallace: "The JPEG Still Picture Compression Stan-dard" ,IEEE Trans. on Consumer Electronics, vol. 38 , no.l, ppI8-34, 1992.

[24] Y. Wang, J. Ostermann, Y-Q. Zhang: Digital Video Processing and Communications, Prentice Hall, 2001.

[ References on Cryptography, Security, and Copyright )

[25) B. Schneier: Applied Cryptography: protocol, algorithms, and source code in C, 2nd Ed., John Wiley & Sons, 1996.

References 195

[26] W. 'frappe and L.C. Washington: Introduction to Cryptography with Coding Theory, Prentice Hall, 200l.

[27] U.S. Copyright Office: "The Digital Millennium Copyright Act of 1998" (DMCA), Summary and Public Law, 1998.

[ Tutorials, Surveys, and Special Issues on Data Hiding]

[ See also:] [128, 132]

[28] R.J. Anderson, F.A.P. Petitcolas: "Information Hiding: An Annotated Bibliography", http://www.cl.cam.ac.uk/ rvfapp2/ stegano graphy/ bibliography /, August 1999.

[29] I.J. Cox, M.L. Miller, J.A. Bloom: Digital Watermarking, Morgan Kaufmann Publishers, 200l.

[30] F. Hartung, M. Kutter: "Multimedia Watermarking Techniques", Pro­ceedings of IEEE, vol.87, no.7, pp.1079-1107, July, 1999.

[31] F. Mintzer, G. W. Braudaway, M. M. Yeung: "Effective and Ineffective Digital Watermarks", Proc. of the IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, Oct. 1997.

[32] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn: "Information Hiding - A Survey", Proceedings of IEEE, vol. 87, no.7, pp.1062-1078, July, 1999.

[33] M.D. Swanson, M. Kobayashi, A.H. Tewfik: "Multimedia data­embedding and watermarking technologies", Proceedings of IEEE, vol. 86, pp.1064-1087, June, 1998.

[34] Special Issue on Watermarking, Communications of the ACM, vo1.41, no.7, July, 1998.

[35] Special Issue on Emerging Applications of Multimedia Data Hiding, EURASIP Journal on Applied Signal Processing (JASP), vo1.2002, no.2, Feb. 2002.

[36] Special Issue on Copyright and Privacy Protection, IEEE Journal on Selected Areas in Communication (JSAC), v.16, n.4, May 1998.

[37] Special Issue on Identification and Protection of Multimedia Informa­tion, Proceedings of IEEE, vol.87, no.7, July, 1999.

[38] Special Issue on Watermarking, Signal Processing, vol.66, no.3, Else­vier Science, May, 1998.

196 References

[ Theses on Data Hiding and Watermarking J

[39J B. Chen: Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems, Ph.D. Dissertation, MIT, June 2000.

[40J D. Karakos: Digital Watermarking, Fingerprinting, and Compression: An Information-Theoretic Perspective, Ph.D. Dissertation, University of Maryland, College Park, June 2002.

[41J D. Kundur: Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals, Ph.D. Dissertation, University of Toronto, 1999.

[42J C-Y. Lin: Watermarking and Digital Signature Tecniques for Multi­media Authentication and Copyright Protection, Ph.D. Dissertation, Columbia University, Dec. 2000.

[43J L. Qiao: Multimedia Security and Copyright Protection, Ph.D. Disser­tation, University of Illinois at Urbana-Champaign, 1998.

[44J M. Ramkumar: Data Hiding in Multimedia - Theory and Applications, Ph.D. Dissertation, 2000.

[45J J. Song: Optimal Rate Allocation and Security Schemes for Image and Video Transmission over Wireless Channels, Ph.D. Dissertation, University of Maryland, College Park, 2000.

[46J M. Wu: Multimedia Data Hiding, Ph.D. Dissertation, Princeton Uni­versity, April 2001, http://www.ee.princeton.edu/..-.minwu/ research /phd_thesis.html .

[47J W. Zeng: Resilient Video Transmission and Multimedia Database Ap­plication, Ph.D. Dissertation, Princeton University, April 1997.

[ Spread Spectrum Additive Watermarking (Type-I Embedding) J

[ See also: J [98, 102, 105, 113, 172, 173J

[48J W. Bender, D. Gruhl, N. Morimote, "Techniques for Data Hiding", Proc. of SPIE, vo1.2420, pp40, 1995.

[49J 1. Cox, J. Kilian, T. Leighton, T. Shamoon: "Secure Spread Spectrum Watermarking for Multimedia" , IEEE Transaction on Image Process­ing, vol. 6 , no.12, pp.1673-1687, 1997.

[50J I.J. Cox: "Spread Spectrum Watermark for Embedded Signaling", U.S. Patent 5,848,155, Dec. 8, 1998.

References 197

[51] I.J. Cox, M.L. Miller, A. McKellips: "Watermarking as Communica­tions With Side Information", Proceedings of the IEEE, vol. 87, no. 7, pp. 1127-1141, 1999.

[52] G. Depovere, T. Kalker, J-P. Linnartz: "Improved Watermark Detec­tion Using Filtering Before Correlation", IEEE Int. Conf. on Image Processing, vol. 1, pp. 430-434, Chicago, IL, Oct. 1998.

[53] A. Herrigel, J. Oruanaidh, H. Petersen, S. Pereira, T. Pun: "Secure Copyright Protection Techniques for Digital Images" , Proc. of Second Information Hiding Workshop (IHW), Lecture Notes in Computer Science, Springer-Verlag, vol. 1525, 1998.

[54] J. Liang, P. Xu, T.D. Tran, "A universal robust low frequency wa­termarking scheme," submitted to IEEE Trans. on Image Processing, May 2000. A short version appeared in Conf. on Information Sciences and Systems (CISS'OO), Princeton, NJ, March 2000.

[55] M.L. Miller, J.A. Bloom: "Computing the probablity of false water­mark detection", Proceedings of the Third International Workshop on Information Hiding (IHW), 1999.

[56] M.L. Miller, J.A. Bloom, I.J. Cox: "Exploiting Detector and Im­age Information in Watermark Embedding", Proc. of the IEEE In­ternational Conference on Image Processing (ICIP'OO), Vancouver, Canada, Sept. 2000.

[57] C. Podilchuk, W. Zeng: "Perceptual Watermarking of Still Images", IEEE First Workshop of Multimedia Signal Processing, 1997.

[58] C. Podilchuk, W. Zeng: "Image Adaptive Watermarking Using Visual Models", IEEE Journal Selected Areas of Communications (JSAC), vo1.16, no.4, pp.525-538, May, 1998.

[59] M. D. Swanson, B. Zhu, A. H. Tewfik, "Transparent Robust Image Watermarking" , Proc. of the IEEE International Conference on Image Processing (ICIP'96), Lausanne, Switzerland, Sept. 1996.

[60] B. Tao, B. Dickinson: "Adaptive Watermarking in the DCT Domain" , Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1997.

[61] W. Zeng, B. Liu, "A Statistical Watermark Detection Technique Without Using Original Images for Resolving Rightful Ownerships of Digital Images," IEEE Trans. Image Processing, vol. 8, no. 11, pp. 1534-1548, Nov. 1999.

198 References

[ Robust Data Hiding Via Enforcement (Type-II Embedding) ]

[ See also:] [95, 97, 99, 100, 107, 108, 125, 127, 131, 136, 137, 138, 139, 145, 146, 168]

[62] B. Chen, G.W. Wornell: "Digital Watermarking and Information Em­bedding Using Dither Modulation", Proc. of IEEE Workshop on Mul­timedia Signal Processing, Dec. 1998.

[63] B. Chen, G.W. Wornell: "Dither Modulation: A New Approach to Digital Watermarking and Information Embedding", Proc. of SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, Jan., 1999.

[64] B. Chen, G.W. Wornell: "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding" , IEEE Trans. on Info. Theory, vol.47, noA, pp1423-1443, May 2001.

[65] J. Chou, S.S. Pradhan, L.E. Ghaoui, K. Ramchandran: "Watermark­ing Based on Duality With Distributed Source Coding and Robust Optimization Principles" , Proc. of the IEEE International Conference on Image Processing (ICIP'OO), Vancouver, Canada, Sept. 2000.

[66] J.J. Eggers, R Bauml, R Tzschoppe, B. Girod: "Scalar Costa Scheme for Information Embedding", submitted to IEEE Trans. on Signal Processing, 2002, preprint available at http:/ / www-nt.e-technik.uni­erlangen.de/ rveggers/ publications.html.

[67] C-T. Hsu, J-L. Wu: "Hidden Signatures in Image" , Proc. of the IEEE International Conference on Image Processing (ICIP'96), vol. 3, Lau­sanne, Switzerland, Sept. 1996.

[68] M. Kesal, M.K. Mihcak, R Koetter, and P. Moulin: "Iteratively De­codable Codes for Watermarking Applications,", Proc. of 2nd Inter. Symp. on Turbo codes and Related Topics, Brest, France, Sept. 2000.

[69] E. Koch, J. Zhao: "Towards Robust and Hidden Image Copyright Labeling", Proc. of IEEE Workshop on Nonlinear Signal and Image Processing, 1995.

[70] G.C. Langelaar and RL. Lagendijk: "Optimal Differential Engergy Watermarking of DCT Encoded Images and Video", IEEE Trans. on Image Processing, voLlO, no.1, pp.148-158, Jan. 2001.

[71] M. Ramkumar, A.N. Akansu: "A Robust Scheme for Oblivious De­tection of Watermarks / Data Hiding in Still Images", Symposium on Voice, Video, and Data Communication, Proc. of SPIE, 1998.

References 199

[72] M.D. Swanson, B. Zhu, A.H. Tewfik: "Robust Data Hiding for Im­ages", Proc. of IEEE DSP Workshop, 1996.

[ Data Hiding Capacity and Related Fundamental Issues]

[ See also:] [64]

[73] M. Barni, F. Bartolini, A. De Rosa, A. Piva: "Capacity of Full Frame DCT Image Watermarks" , IEEE Trans. On Image Proc., vol. 9, nO. 8, pp.1450 -1455, Aug. 2000.

[74] M.H.M. Costa: "Writing On Dirty Paper", IEEE Trans. on Info. The­ory, vol. IT-29, nO. 3, May 1983.

[75] L.M. Marvel, C.G. Boncelet: "Capacity of the Additive Stegano­graphic Channel", preprint, 1999, http:// www.eecis.udel.edu/ ""'marvell·

[76] P. Moulin, J.A. O'Sullivan: "Information-Theoretic Analysis of In­formation Hiding", preprint, Sept. 1999, revised Dec. 2001, http:/ I www.ifp. uiuc.edul "",moulinl paper.html.

[77] P. Moulin and J.A. O'Sullivan: "Information-Theoretic Analysis of Watermarking", Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2000.

[78] P. Moulin, M.K. Mihcak, G-1. Lin: "An Information-theoretic Model for Image Watermarking and Data Hiding", Proc. of the IEEE In­ternational Conference on Image Processing (ICIP'OO), Vancouver, Canada, Sept. 2000.

[79] M. Ramkumar, A.N. Akansu: "Information Theoretic Bounds for Data Hiding in Compressed Images" , Proc. of IEEE 2nd Multimedia Signal Processing Workshop, 1998.

[80] S. D. Servetto, C. I. Podilchuk, K. Ramchandran: "Capacity Issues in Digital Image Watermarking", Proc. of the IEEE International Con­ference on Image Processing (ICIP'98), Chicago, IL, Oct. 1998.

[81] C.E. Shannon: "The Zero-error Capacity of a Noisy Channel", IRE Trans. on Info. Theory, IT-2, pp8-19, 1956.

[82] C.E. Shannon: "Channels With Side Information at the Transmitter" , IBM Journal of Research and Development, pp. 289-293, 1958.

[83] J.R. Smith, B.O. Comiskey: "Modulation and Information Hiding in Images", Proc. of the First Information Hiding Workshop (IHW), 1996.

200 References

[84] M. Wu, B. Liu: "Digital Watermarking Using Shuffling", Proc. of IEEE International Conference on Image Processing (ICIP'99), Kobe, Japan, 1999.

[85] M. Wu, B. Liu: "Modulation and Multiplexing Techniques for Mul­timedia Data Hiding", Invited paper, Proc. of SPIE ITcom 2001 -Multimedia Systems and Applications IV, SPIE vol. 4518, Denver, CO, Aug. 2001

[86] M. Wu, B. Liu: "Data Hiding in Image and Video: Part-I - Fun­damental Issues and Solutions", submitted to IEEE Trans. on Im­age Processing, Jan. 2002, http://www.ece. umd.edu/ ""minwu/ re­search.html #Journal .

[ Perceptual Models: HAS and HVS ]

[ See also:] [14, 24]

[87] Association of Blind Piano Tuners: "History of Pitch", http://www. uk-piano.org/ history /pitch.html, 2000.

[88] P.R. Cook (eds.): Music, Cognition, and Computerized Sound: An Introduction to Psychoacoustics, The MIT Press, 1999.

[89] Doug Coulter: Digital Audio Processing, R&D Books, 2000.

[90] H.A. Peterson, A.J. Ahumada, A.B. Watson: "Improved Detection Model for DCT Coefficient Quantization", Proc. SPIE Conf. Human Vision, Visual Processing, and Digital Display IV, vol. 1913, pp.191-201, Feb. 1993.

[91] E.E. Swenson: "The History of Musical Pitch in Tuning the Pi­anoforte", http://www.mozartpiano.com/pitch.html. 2000.

[92] A.B. Watson: "DCT Quantization Matrices Visually Optimized for Individual Images", Proc. SPIE Conf. Human Vision, Visual Pro­cessing, and Digital Display IV, vol. 1913, pp.202-216, Feb. 1993.

[ Specialized Embedding: Binary Images ]

[93] A.K. Bhattacharjya, H. Ancin: "Data Embedding in Text For a Copier System", Proc. of the IEEE International Conference on Image Pro­cessing (ICIP'99), Kobe, Japan, Oct. 1999.

[94] A. Finkelstein: personal communication, 1998.

[95] E. Koch, J. Zhao: "Embedding Robust Labels Into Images for Copy­right Protection" , Proceedings of the International Congress on Intel­lectual Property Rights for Specialized Information, Knowledge f3 New Technologies, 1995.

References 201

[96) Y. Liu, J. Mant, E. Wong, S.H. Low: "Marking and Detection of Text Documents Using Transform-domain Techniques", Proceedings of SPIE, vol. 3657, Electronic Imaging (EI'99) Conference on Secu­rity and Watermarking of Multimedia Contents, San Jose, CA, 1999.

[97] K Matsui, K Tanaka: "Video-steganography: How to Secretly Embed a Signature in a Picture", Proc. of IMA Intellectual Properly Project, vol. 1, no. 1, 1994.

[98) N.F. Maxemchuk, S. Low: "Marking Text Documents", Proc. of the IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, Oct. 1997.

[99) M. Wu, E. Tang, B. Liu: "Data Hiding in Digital Binary Image" , Proc. of IEEE International Conference on Multimedia & Expo (ICME'OO), New York City, NY, 2000.

[100] M. Wu, B. Liu: "Data Hiding in Binary Image for Authentication and Annotation" , revised for publication in IEEE Trans. on Multime­dia, March 2002, http://www.ece. umd.edu/ rvminwu/ research.html #Journal .

[ Specialized Embedding: Audio)

[101) S.J. Best, R.A. Willard: "Signal Identification", US Patent 4,876,617, Thorn EMI Pic, October 1989.

[102] L. Boney, A.H. Tewfik, KN. Hamdy: "Digital Watermarking for Audio Signals" , Proc. of Inter. Conf. on Multimedia Computing and Systems (ICMCS '96), Hiroshima, Japan, pp.473-480, June, 1996.

[103] X. Li, H. Yu: "Transparent and Robust Audio Data Hiding in Cep­strum Domain" , Proc. of IEEE International Conference on Multime­dia & Expo (ICME'OO), New York City, NY, 2000.

[104) R. Petrovic, J.M. Winograd, K Jemili, E. Metois: "Apparatus and Method for Encoding and Decoding Information in Analog Signals" , US Patent 5,940,135, Aris Technologies, Inc., August 1999.

[ Specialized Embedding: Video]

[ See also:] [146]

[105] F. Hartung, B. Girod: "Watermarking of Uncompressed and Com­pressed Video", Signal Processing, vol.66, no. 3, pp. 283-301, May, 1998.

202 References

[106] M.L. Miller, LJ. Cox, J.A. Bloom: "Watermarking in the Real World: An Application to DVD", Proc. of Watermark Workshop at ACM Multimedia '98, 1998.

[107] D. Mukherjee, J-J. Chae, S.K. Mitra, B.S.Manjunath: "A Source and Channel Coding Framework for Vector-Based Data Hiding in Video", IEEE Trans. on Circuits and Systems for Video Technology, v.10, n.4, pp630-645, June, 2000.

[108] M.D. Swanson, B. Zhu, A.H. Tewfik: "Data Hiding for Video-in­Video", Proc. of the IEEE International Conference on Image Pro­cessing (ICIP'97), Santa Barbara, Oct. 1997.

[109] M.D. Swanson, B. Zhu, A.H. Tewfik: "Multiresolution Scene-Based Video Watermarking Using Perceptual Models", IEEE Journal on Selected Areas in Communication (JSAC), v.16, n.4, pp540-550, May 1998.

[110] M. Wu, H. Yu, A. Gelman: "Multi-level Data Hiding for Digital Image and Video", Proceedings of SPIE, vol. 3845, Photonics East Confer­ence on Multimedia Systems and Applications, Boston, MA, 1999.

[111] M. Wu, H. Yu: "Video Access Control via Multi-level Data Hid­ing", Proc. of IEEE International Conference on Multimedia (3 Expo (ICME'OO), New York City, NY, 2000.

[112] M. Wu, H. Yu, B. Liu: "Data Hiding in Image and Video: Part-II - De­signs and Applications" , submitted to IEEE Trans. on Image Process­ing, Jan. 2002, http://www.ece. umd.edu/ "'minwu/ research.html #Journal.

[113] W. Zhu, Z. Xiong, Y-Q. Zhang: "Multiresolution Wavelet-Based Wa­termarking of Images and Video" , IEEE Trans. Circuits and Systems for Video Tech, vol. 9, pp. 545-550, June 1999.

[ Specialized Embedding: 3-D Graphic Data]

[114] O. Benedens: "Geometry-based Watermarking of 3-D Models", IEEE Computer Graphics and Applications, Jan. 1999, pp46-55.

[115] R. Ohbuchi, H. Masuda, M. Aono: "Watermarking Three-Dimensional Polygonal Models Throug Geometric and Topological Modifications" , IEEE Journal on Selected Areas in Communications (JSAC), vol. 16, no. 4, May 1998, pp551-559.

[116] E. Praun, H. Hoppe, A. Finkelstein: "Robust Mesh Watermarking", Proc. of ACM SIGGRAPH, 1999.

[117] M.M. Yeung and B-L. Yeo: "Fragile Watermarking of 3-D Objects", Proc. of Inter. Conf. on Image Processing (ICIP), Chicago, IL, 1998.

References 203

[ Specialized Embedding: Visible Watermarking]

[118] G.W. Braudaway, KA. Magerlein, F. Mintzer: "Protecting Publicly­Available Images With A Visible Image Watermark", SPIE Conf. on Optical Security and Counterfeit Deterrence Techniques, vol. 2659, pp. 126-133, Feb. 1996.

[119] J. Meng, S-F. Chang: "Embedding Visible Video Watermarks in the Compressed Domain" , Proc. of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, Oct. 1998.

[ Specialized Embedding: Non-Perceptual Data]

[120] G. Qu, J.L. Wong, and M. Potkonjak: "Optimization-Intensive Watermarking Techniques for Decision Problems", Proc. of 36th ACM/IEEE Design Automation Conference Proceedings, pp.33-36, June 1999.

[121] J. Stern, G. Hachez, F. Koeun, J-J. Quisquater: "Robust Object Wa­termarking: Application to Code", Proc. of the Third Info. Hiding Workshop (IHW'99) , 1999.

[ (Semi-) Fragile Watermarking for Authentication/Annotation]

[122] Epson America, Inc.: http://www.epson.com/cam....scan/cam_extras/ ias/, Image Authentication System, 1999.

[123] J. Fridrich, M. Goljan: "Protection of Digital Images using Self Em­bedding", Proc. of Symposium on Content Security and Data Hiding in Digital Media, Newark, NJ, May 1999.

[124] G. L. Friedman: "The Trustworthy Digital Camera: Restoring Credi­bility to the Photographic Image", IEEE Trans. on Consumer Elec­tronics, vol.39, no.4, pp.905-91O, Nov. 1993.

[125] D. Kundur and D. Hatzinakos: "Digital Watermarking for Telltale Tamper-Proofing and Authentication," Proceedings of the IEEE, Spe­cial Issue on Identification and Protection of Multimedia Information, vol. 87, no. 7, pp.1167-1180, July 1999.

[126] C.Y. Lin, S.F. Chang: "A Robust Image Authentication Method Sur­viving JPEG Lossy Compression", Proc. of SPIE Storage and Re­trieval of Image/Video Databases, Jan. 1998.

[127] C-Y. Lin and S-F. Chang: "Semi-Fragile Watermarking for Authenti­cating JPEG Visual Content", Proc. of SPIE International Conf. on Security and Watermarking of Multimedia Contents II (EI'OO), vol. 3971,2000.

204 References

[128] E.T. Lin, E.J. Delp: "A Review of Fragile Image Watermarks", Proc. of the Multimedia and Security Workshop (ACM Multimedia '99), pp25-29, 1999.

[129] C-S. Lu, H-Y.M. Liao: "Multipurpose Watermarking for Image Au­thentication and Protection" , Technical Report, Institute of Informa­tion Science, Academia Sinica, Taiwan, 2000.

[130] F. Mintzer, G. Braudaway: "If one watermark is good, are more better? ," Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, Phoenix, Arizona, March 1999.

[131] F.A.P. Petitcolas, Examples of Least-significant-bit Embedding, http://www.cl.cam.ac.uk/ "'fapp2/steganography / image_ downgrad­ing/, 1998.

[132] C. Rey and J-L. Dugelay: "A Survey of Watermarking Algorithms for Image Authentication", EURASIP Journal on Applied Signal Pro­cessing (JASP), vol.2002, no.6, June 2002.

[133] M. Schneider, S-F. Chang: "A Robust Content Based Digital Sig­nature for Image Authentication", Proc. of the IEEE International Conference on Image Processing (ICIP'96), Lausanne, Switzerland, Sept. 1996.

[134] D. Storck: "A New Approach to Integrity of Digital Images", Proc. of IFIP Conf. on Mobile Communication, 1996.

[135] S. Walton: " Image Authentication for a Slippery New Age", Dr. Dobb's Journal, pp18-26, April, 1995.

[136] P. W. Wong: "A Watermark for Image Integrity and Ownership Ver­ification", ISfJT PIC Conf. Proc., Portland, Oregon, 1998.

[137] M. Wu, B. Liu: "Watermarking for Image Authentication", IEEE In­ternational Conference on Image Processing (ICIP'98), Chicago, IL, 1998.

[138] L. Xie, G. R. Arce: "Joint Wavelet Compression and Authentication Watermarking" , Proc. of the IEEE International Conference on Image Processing (ICIP'98), Chicago, IL, Oct. 1998.

[139] M. M. Yeung, F. Mintzer: "An Invisible Watermarking Technique for Image Verification", Proc. of the IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, Oct. 1997.

References 205

[ Digital Fingerprinting ]

[140] D. Boneh and J. Shaw: "Collusion-Secure Fingerprinting for Digital Data," IEEE Trans. on Info. Theory, vol. 44, Sept. 1998, 1897-1905.

[141] J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg: "Combining digital watermarks and collusion secure fingerprints for digital images," SPIE Journal of Electronic Imaging, vol. 9, pp. 456-467,2000.

[142] W. 'Irappe, M. Wu, K.J.R. Liu: "Anti-collusion Fingerprinting for Multimedia", IEEE Trans. on Signal Processing, Special issue on Sig­nal Processing for Data Hiding in Digital Media & Secure Content Delivery, to appear in 1st Quarter of 2003.

[143] W. 'Irappe, M. Wu, K.J.R. Liu, "Collusion-Resistant Fingerprinting for Multimedia," Proc. of IEEE Intern. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), Orlando, FL, May 2002.

[ Miscellaneous Applications of Data Hiding]

[144] D.A. Silverstein, S.A. Klein: "Precomputing and Encoding Com­pressed Image Enhancement Instructions", United States Patent 5,822,458, Oct. 1998.

[145] D.A. Silverstein, S.A. Klein: "Precomputing and Encoding Com­pressed Image Enhancement Instructions" , in review for IEEE trans­actions on image processing, http://www.best.com/..-.amnon/ Home­pagel Research/Papers/ EncodingEnhance/EncodingEnhance.html , 2000.

[146] J. Song, K.J.R. Liu: "A Data Embedding Scheme for H.263 Com­patible Video Coding", Proc. of Inter. Symposium on Circuits and Systems (ISCAS), vol.4, 1999.

[147] J. Song, R. Poovendran, W. 'Irappe, K.J.R. Liu: "A Dynamic Key Distribution Scheme Using Data Embedding for Secure Multimedia Multicast", Proc. of SPIE Electronic Imaging, 2001.

[148] P. Yin, B. Liu, H. Yu: "Error Concealment Using Information Hid­ing", Proc. of IEEE Intern. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), Salt Lake City, UT, May 2001.

[149] P. Yin, M. Wu, B. Liu: "Video 'Iranscoding by Reducing Spatial Reso­lution", Proc. of IEEE International Conference on Image Processing (ICIP'OO), Vancouver, Canada, 2000.

206 References

[150] P. Yin, M. Wu, and B. Liu: "A Robust Error Resilient Approach for MPEG Video Transmission Over Internet" , Proc. of Inter. Conference on Visual Comm. & Image Processing (VCIP'02), San Jose, CA, Jan. 2002.

[ Attack and Security Issues of Watermarking]

[151] J. Boeufl, J.P. Stern: "An Analysis of One of the SDMI Candidates", Technical Report, http://www.julienstern.org/ sdmi/files/sdmiF /sd­miF.html, 2001.

[152] 1. Cox, J-P. Linnartz: "Some General Methods for Tampering with Watermarks", IEEE Journal Selected Areas of Communications (JSAC), vo1.16, no.4, May, 1998.

[153] S. Craver, N. Memon, B-L. Yeo, M. M. Yeung: "Can Invisible Water­marks Resolve Rightful Ownerships?", IBM Research Report, 1996.

[154] S. Craver, N. Memon, B-L. Yeo, M. M. Yeung: "On the Invertibility of Invisible Watermarking Techniques" , Proc. of the IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, Oct. 1997.

[155] S. Craver, N.Memon, B-L. Yeo, M.M. Yeung: "Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, At­tacks, and Implications", IEEE Journal on Selected Areas in Commu­nication (JSAC), v.16, n.4, pp573-586, May 1998.

[156] S.A. Craver, M. Wu, B. Liu, A. Stubblefield, B. Swartzlander, D.S. Wallach, D. Dean, E.W. Felten: "Reading Between the Lines: Lessons from the SDMI Challenge", Proc. of 10th Usenix Security Symposium, Aug. 2001. Also accepted by Proc. of 4th Info. Hiding Workshop, Apr. 2001.

[157] F. Hartung, J.K. Su, B. Girod: "Spread Spectrum Watermarking: Ma­licious Attacks and Counterattacks", Proc. of SPIE, Security and Wa­termarking of Multimedia Contents, vol. 3657, Jan., 1999.

[158] M. Holliman, N. Memon, "Counterfeiting Attacks on Oblivious Block­wise Independent Invisible Watermarking Schemes", IEEE Trans. on Image Processing, vol.9, no.3, March 2000.

[159] F. Petitcolas, R. Anderson, M. Kuhn, "Attacks on Copyright Marking Systems", Proc. of Second Workshop on Info. Hiding, 1998.

[160] Secure Digital Music Initiative (SDMI): http://www. sdmi.org, 2000.

[161] Secure Digital Music Initiative (SDMI): "SDMI Portable Device Spec­ification", Part 1, ver 1.0, 1999.

References 207

[162J StirMark Watermark Testbed, http://www.cl.cam.ac.uk/ rvfapp2/ watermarking/ stirmark/, 1998.

[163J H. Stone, "Analysis of Attacks on Image Watermarks with Random­ized Coefficients" , Technical Report 96-045, NEC Research Institute, 1996.

[164J Test result of International Evaluation Project for Digital Water­mark Technology for Music: http://www.nrLco.jp/english/ news/ 2000/001006.html, 2000.

[165J UnZign, http://www.altern.com/watermark/. A Watermark Robust­ness Testing Software, 1997.

[166J M. Wu, B. Liu: "Attacks on Digital Watermarks" , Proc. of 33th Asilo­mar Conference on Signals, Systems, and Computers, 1999.

[167J M. Wu, S.A. Craver, E.W. Felten, B. Liu: "Analysis of Attacks on SDMI Audio Watermarks", Proc. of IEEE International Conference on Acoustic, Speech, and Signal Processing (ICASSP'Ol), 2001.

[ Geometric-Distrotion Resilient Watermarking J

[168J M. Alghoniemy, A.H. Tewfik: "Self-synchronizing Watermarking Tech­niques" , Proc. of Symposium on Content Security and Data Hiding in Digital Media, NJ Center for Multimedia Research and IEEE, 1999.

[169J M. Alghoniemy and A.H. Tewfik: "Geometric Distortion Correction Through Image Normalization", Proc. of Inter. Conf. on Multimedia and Expo (ICME'OO), New York, NY, Aug. 2000.

[170] G. Csurka, F. Deguillaume, J.J.K. ORuanaidh, T. Pun: "A Bayesian approach to Affine 'Transformation Resistant Image and Video Wa­termarking", Proc. of the 3rd Information Hiding Workshop (IHW), Lecture Notes in Computer Science, pp315-330, Springer-Verlag, 1999.

[171] N.F. Johnson, Z. Durie, S. Jajodia: "Recovery of Watermarks from Distorted Images", Proc. of the 3rd Int. Information Hiding W ork­shop, pp.361-375, 1999.

[172J C-Y. Lin, M. Wu, J.A. Bloom, M.L. Miller, I.J. Cox, Y-M. Lui: "Ro­tation, Scale, and 'Translation Resilient Public Watermarking for Im­ages", Proceedings of SPIE, vol. 3971, Electronic Imaging (EI'OO) Con­ference on Security and Watermarking of Multimedia Contents, San Jose, CA, 2000.

[173J C-Y. Lin, M. Wu, Y-M. Lui, J.A. Bloom, M.L. Miller, I.J. Cox: "Ro­tation, Scale, and 'Translation Resilient Public Watermarking for Im­ages", IEEE Transactions on Image Processing, voLlO, no.5, pp.767-782, May 2001.

208 References

[174] J.J.K. ORuanaidh, T. Pun, "Rotation, Translation and Scale Invari­ant Spread Spectrum Digital Image Watermarking", Signal Process­ing, vol.66, no.3, 1998.

[175] S. Pereira, T. Pun: "Fast Robust Template Matching for Affine Resis­tant Image Watermarks", Proc. of the 3rd Information Hiding Work­shop (IHW), Lecture Notes in Computer Science, Springer-Verlag, pp207-218, 1999.

[Multimedia Processing Useful to Designers or Adversaries]

[176] Corel Stock Photo Library, Corel Corporation, Canada.

[177] GoldWave: http://www.goldwave.com (audio editing software), 2000.

[178] H. Igehy, L. Pereira, "Image Replacement Through Texture Synthe-sis" , Proc. of the IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, Oct. 1997.

[179] K. Jung, J. Chang, C. Lee, "Error Concealment Technique Using Pro­jection Data for Block-based Image Coding", Proc. of SPIE Conf. on Visual Communication and Image Processing, vol.2308, ppI466-1476, 1994.

[180] B. Liu, T. Chang, H. Gaggioni: "On the Accuracy of Transformation Between Color Components in Standard and High Definition Televi­sion", Proc. of HDTV'92 Workshop, pp57, 1992.

[181] M. McGuire: "An Image Registration Technique for Recovering Ro­tation, Scale and Translation Parameters", Technical Report 98-018, NEC Research Institute, 1998.

[182] Scalable Display Wall, http://www.cs.princeton. edu/ omnimedia , Princeton University, 1999.

[183] H.S. Stone, B. Tao, M. McGuire: "Analysis of Image Registration Noise Due to Rotationally Dependent Aliasing" , Technical Report 99-057R, NEC Research Institute, 1999.

[184] W. Zeng, B. Liu, "Geometric-structure-based Directional Filtering for Error Concealment in Image/Video Transmission", SPIE Photonics East'95, vol.2601, pp.145-156, Oct. 1995.

[ Efficient and Secure Multimedia Communications 1

[ See also:] [24]

[185] B. Liu, K-W. Chow, A. Zaccarin: "Simple Method to Segment Motion Field for Video Coding," Proceeding of SPIE, vol. 1818, 1992.

References 209

[186] N. Merhav, V. Bhaskaran: "A Transform Domain Approach to Spatial Domain Image Scaling," Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1996.

[187] M.T. Orchard, G.J. Sullivan: "Overlapped Block Motion Compensa­tion: An Estimation-theoretic Approach," IEEE Transaction on Im­age Processing, vol. 3, NO.5, 1994.

[188] B. Shen, LK. Sethi, V. Bhaskaran: "Adaptive Motion Vector Resam­pIing for Compressed Video Down-scaling," Proc. of the IEEE Inter­national Conference on Image Processing (ICIP'97), Santa Barbara, Oct. 1997.

[189] Y. Wang, Q. Zhu: "Error Control and Concealment for Video Com­munication: A Review", Proc. of IEEE, v.86, pp.974-997, May, 1998.

[190] Y. Wang, S. Wenger, J. Wen, A. Katasggelos: "Error Resilient Video Coding Techniques", IEEE Signal Processing Magazine, July, 2000.

[191] J. Wen, M. Muttrell, M. Severa: "Access Control of Standard Video Bitstreams", Proc. of Inter. Conf. on Media Future, May 200l.

[192] M. Wu, R. Joyce, H-S. Wong, L. Guan, S-Y. Kung: "Dynamic Re­source Allocation Via Video Content and Short-term Traffic Statis­tics", IEEE Trans. on Multimedia, Special Issue on Multimedia over IP, vol.3, no.2, pp.186-199, June 200l.

[193] N. Yeadon, F. Garcia, D. Hutchison, D. Shepherd: "Continuous Me­dia Filters for Heterogeneous Internetworking," Proceedings of SPIE - Multimedia Computing and Networking (MMCN'96) , 1996.

[194] W. Zeng, S. Lei: "Efficient Frequency Domain Video Scrambling for Content Access Control", Proc. of ACM Multimedia, Nov. 1999.

Index

A

Additive embedding, 2D-21, see also Type-I embedding

Additive noise robustness against, 183 sources, 27 statistical model, 27, 39

Adversaries, see also Attacks; Se­curity

applicable applications, 10, 149-150

concealing communications against, 2

in SDMI public challenge, 175-189

incentive in authentication, 65 measures against, 81-83

Applications of data hiding access control, 1, 5, 15, 93,

96, 115, 146, 175, 188 annotation, 1,5,65, 74, 94 content authentication, 1, 4,

15, 65, 75-76, 93, 119-136, 168-173, 178, 188

conveying side information, 1, 9, 137-146

copy control, 5, 93, 96, 175, 188

device control, 5, 93, 96, 175, 188

fingerprinting, 5, 15, 93 ownership protection, 1,4, 15,

93, 96 rights management, 5, 96,146,

175-189, 192 traitor tracing, see fingerprint­

ing Attackers, see Adversaries Attacks, see also Adversaries; Se­

curity averaging multiple copies, 109,

151, 157 blind attacks, 179 block replacement attack, 10,

15D-155 ciphertext attack, 179 collusion attacks, 109, 151 concealment attack, 10, 150-

155

212 Index

copy attack, 65, 184 countermeasures against, see

Countermeasures (against attacks)

double capturing attack, 10, 171-172

filtering attacks, 150-155 forgery attacks, 123, 188-189 geometric distortion, 187, see

also jittering attacks; warp­ing attack

geometric distortions, 151 jittering attacks, 149, see also

geometric distortion; warp­ing attack

audio, 179, 180, 187 images, 151 video frames, 109, 136

known data hiding algorithm, against, 149-173

plaintext attack, 82, 179 SDMI attacks, see SDMI pub­

lic challenge synchronization attack, see ge­

ometric distortion; jitter­ing attack; warping at­tack

unknown data hiding algorithm, against, 175-189

warping attack, 151, 180, 187, see also jittering attacks; geometric distortion

Audio attacks against audio water­

marking, 10, 175-189 golden ear, 183, 184 human auditory system, see

Human auditory system (HAS)

Authentication, see also Applica­tions of data hiding

advantages of watermarks for, 74, 119-120

attacks against, 171-173 cryptographic, 121

embedded digital signature for, 121

fragile watermarking for, 75-76, 121

semi-fragile watermarking for, 69

AWGN (additive white Gaussian noise), 23, 26-30

B

Binary images document images, 75-76 embedding mechanism for, 69-

70 equalizing uneven embedding

capacity for, 70-73 line drawing, 74 perceptual model, 67-69 pixel fiippability, 68, 84-88 recovering from printing and

scanning, 78-80, 88-91 robustness for watermarking,

69, 77-80 security for watermarking, 81-

83 signature images, 70, 74 watermark applications for, 65,

74-76 Biorthogonal modulation, see Mod­

ulation and multiplexing Bit error

combat, 70 probability, 29 recover, in video communica­

tions, 145 Block concealment

attacks by, 10, 150-155 edge directed interpolation for,

143, 151 Block DCT transform, 48, 96, 121-

123, 153-154, see also DCT Block-based data hiding, 67-73, 96-

109, 150-155 Bursty errors, 145

c

Capacity embedding, see Embedding ca­

pacity generic channels, see Chan­

nel capacity CDM, see Modulation and multi­

plexing, CDM Channel capacity, 5, 27, 28, 31 Channels, 5

additive white Gaussian noise (AWGN) channels, 23, 26-30

binary symmetric channel (BSC), 27,30

capacity, see Channel capac­ity

colored Gaussian noise chan­nels, 26, 162

continuous input and contin­uous output (CICO), 27

continuous-input continuous­output (CICO), 29

Costa's code, 19, 32 discrete-input continuous-output

(DICO),28 discrete-input discrete-output

(DIDO), 27, 30 erasure channels, 50 with side information, 19, 21,

159 Ciphers, see Cryptography, encryp­

tion Code division modulation/ multi­

plexing, see Modulation and multiplexing, CDM

Compliance coding standard compliant de­

vice, 9, 33, 138-142 rights management compliant

device, 178, 188 Compression

H.26x,104

Index 213

JPEG, 96, 104, 108, 120, 121, 123, 124, 131, 133, 152, 166, 167

JPEG 2000, 134 lossy, 3-5, 9, 88, 120-122,133,

134, 149, 156, 176, 179, 188

MP3, 178, 189 MPEG, 104, 115, 136 scalable, 94 transcoding, see Transcoding wavelet, 134

Content authentication, see Au­thentication

Control data, 114 Correlation-based detection, 23, 97,

158 distribution of, 24, 98 weighted correlator, 98-99 with normalized variance, 23,

97, 99 Countermeasures (against attacks)

block replacement attack, against, 153-154

concealment attack, against, 153-154

double capturing attack, against, 10,172-173

forgery attacks, against, 81-83, 123, 129-130

geometric attack, against, 155-168

jittering attacks, against audio, 183 video frames, 8, 109-112,

114 RST (rotation, scale, transla­

tion), against, 155-168 Cover media, defined, 15 Cryptography

cryptanalysis, 179 encryption, 2, 3, 146, 150, 189 hash, 119, 121, 189 public-key cryptography, 81,

119, 121

214 Index

signature, see Digital signa­tures, cryptographic

Customized media decoder, 9, 138-142

D

Data hiding, 2 advantages of, 140 binary images, 65-83 color images, 96, 134 framework, 15-17, 122-123 grayscale images, 96-109, 155-

168 key elements of, 16-17 layered system structure, 16 video, 109-116

Data payloads, see Payloads DCT (discrete cosine transform),

see also Block DCT trans­form

block-DCT embedding, see Block DCT transform; Block­based data hiding

DCT -domain visual model, 103-107, 125-128

quantized DCT coefficients, 9, 123-125

whole-DCT embedding, 153-154

Detection Baysian rule, 24, 98 blind detection, see non-coherent

detection coherent detection, 23, 151,

153 detection statistics, 23-24, 151-

156, 158, 166-167 hypothesis testing formulation,

23-24, 97-101 Neyman-Pearson rule, 24, 166-

167 non-coherent detection, 5, 22,

23, 32, 97-101, 151, 155, 156, 187

statistics, see also Correlation­based detection

whitening, 98, 162-164 Digital Millennium Copyright Act

(DMCA),150 Digital rights management (DRM),

146, 175-189, 192 Digital signatures

E

content feature based, 121 cryptographic, 119, 121, 189 digitized signature images, 70,

74 handwritten, 65 signature in signature, 74

ECC, see Error correction coding Embedded data, define, 15 Embedding capacity, 5, 19,26-33 Embedding distortion, defined, 15 Embedding domain

block DCT, 96-109,121-123, 153-154

DFT, 155-168 Fourier-Mellin, 157, 168 pixel, 67, 121 wavelet, 122, 134

Embedding mechanisms, 20-22 additive, 20-21, see also Type­

I embedding enforcement, 21-22, see also

Type-II embedding spread spectrum, 23, 98, 103,

157, 187 table lookup, 34, 69, 123-129 Type-I, see Type-I embedding Type-II, see Type-II embed-

ding Embedding rate

CER (constant embedding rate), 44-51, 112-113

VER (variable embedding rate), 51-53, 112-113

Enforcement embedding, 21-22, see also Type-II embedding

Error analysis detection probability, 167 false alarm probability, 24, 165,

167 false negative, see miss detec­

tion probability false positive, see false alarm

probability miss detection probability, 24 quantization, 24-26 Receiver operating character­

istics (ROC) curves, 166-167

ROC curves, see Receiver op­erating characteristics

Error concealment, see also Block concealment

attacks on data hiding, used as, 10, 15D-155

data hiding for, 9, 143-146 Error correction coding (ECC)

BCH code, 132 Extracted data, defined, 15

F

False negative, see Error analysis, miss detection probabil­ity

False positive, see Error analysis, false alarm probability

Fingerprinting, see Applications of data hiding, fingerprint­ing

Flippability, for binary image pix­els, 68, 84-88

H

Hearing, see Human auditory sys­tem (HAS)

Host media, defined, 15

Index 215

Human auditory system (HAS), 182, 184

Human visual system (HVS) binary images, 67-69, 84-88 DCT-domain visual model, 103-

107 grayscale images, 103-107

Hypothesis testing, 23-24, 97-101

I

Imperceptibility, 16, 17, 31, 125, see also Human auditory system (HAS); Human vi­sual system (HVS)

Interleaving, 47,146, see also Shuf­fling

J

Just noticeable difference (JND), 24, 36, 103-107, see also Human auditory system (HAS); Human visual sys­tem (HVS)

K

embeddable components, 42, 126

unembeddable components, 31, 41,42, 103

Key element of data hiding, see Data hiding, key elements of

Keys, 54-55

L

Layered structure, for data hiding system, 16

Least significant bit (LSB) embed­ding, see Type-II embed­ding, LSB embedding

216 Index

Lookup tables

M

flippable scores, for, 87 Type-II embedding, 34, 69, 123-

128

Marked media, defined, 15 Modulation and multiplexing, 33-

37 amplitude modulation, 33 amplitude modulo modulation,

33-34 biorthogonal modulation, 34,

53 code division modulation/ mul­

tiplexing (CDM), 35-37, 50,52

comparison, 35-37 orthogonal modulation, 34, 36-

37 spatial division, 35, see also

time division modulation/ multiplexing

time division modulation/ mul­tiplexing (TDM), 34-37, 50, 52, 103, 114, 123

Moment-based approach, for ana­lyzing shuffling, 47, 56

Multilevel embedding advantages of, 93-94 basic idea of, 94-96 for images, 96-109 for video, 109-116 spectrum partition for, 97-101

Multiple-bit embedding, 33-37, see also Modulation and mul­tiplexing

N

Noise compression, by, 167 defined, 15

Non-coherent detection, see De­tection, non-coherent de­tection

Non-compliant media decoder, see Customized media decoder

o Original signal, see Host signal Orthogonal modulation, see Mod­

ulation and multiplexing, orthogonal modulation

Ownership protection, see Appli-

p

cations, ownership protec­tion

Payloads, 94, see also Embedding capacity

control data, 94, 114 user data, 94, 113

Perceptual model, see Human au­ditory system (HAS); Hu­man visual system (HVS)

Performance ROC curves, see Receiver op­

erating characteristics Permutation, see Shuffling Pseudo-random number, 54, 126

Q

Quantization

R

error analysis, 24-26 JPEG quantization table, 101 QIM (quantization index mod-

ulation), 25

Random numbers, see Pseudo-random number

Receiver operating characteristics (ROC), 166-167, see also Detection, N eyman-Pearson rule

Registration, see Images, registra­tion

s SDMI (Secure Digital Music Ini­

tiative) background, 175 challenge, see SDMI public chal­

lenge SDMI public challenge

attacks against fragile watermarks,

188-189 against robust watermarks,

179-188 background, 176 setup, 176-178

Security, see also Adversaries; At­tacks

authentication, data hiding for, 126-127, 129-130, 171-173

binary images, data hiding for, 81-83

SDMI systems, 178-189 Seeds, see Keys Shuffling, see also Uneven embed­

ding capacity analysis, 47-49, 55-62 equalizing uneven embedding

capacity, for, 46-51 examples, 70-73 generation algorithm, 54-55

Side information, see also Control data

available to sender in commu­nications, 19, 21, 159

convey to receiver, 52-53, 114, 140

Signature, see Digital signatures

Index 217

Signature in signature, 74 Spread spectrum, see Embedding

mechanisms, spread spec­trum

Steganograph~ 2, 191 Strength of embedding, see also

Human auditory system (HAS); Human visual sys­tem (HVS)

T

TDM, see Modulation and multi­plexing, TDM

Test media, defined, 15 Time division modulation/ multi­

plexing, see Modulation and multiplexing, TDM

Transcoding, 8, 9, 94, 109, 137-142, see also Compres­sion; Video, downsizing

Type-I embedding define, 20 embedding capacity, 27, 29 examples, 21, 101, 114, 157-

159 properties, 23-24 spread spectrum, 23, 98, 103,

157, 187 Type-II embedding

define, 21

u

embedding capacity, 27-29 examples, 22, 69-70, 101, 123-

128 LSB embedding, 22 properties, 24-26

Uneven embedding capacity difficulty introduced by, 41-

42 equalizing, 46-51, see also Shuf­

fling

218 Index

examples, 70-73, 112-113 solutions, 42, see also Embed­

ding rate, CER & VER; Shuffling

User data, 113

v Video

authentication, 136 downsizing, 138-142 MPEG compression, 104, 136,

138 Visible watermark, 4

w Watermark

digital watermark, 3, 15 imperceptible, 3, 4 paper watermark, 2 visible, 4

Watermarking, 2

About the Authors

Min Wu received the B.E. degree in electrical engineering and the B.A. degree in economics from Tsinghua University, Beijing, China, in 1996 (both with the highest honors), and the M.A. degree and Ph.D. degree in electrical engineering from Princeton University in 1998 and 2001, respectively. She was with NEC Research Institute and Signafy, Inc. Princeton, NJ, in 1998, and with the Media Security Group, Panasonic Information & Networking Laboratories, Princeton, NJ, in 1999. Since 2001, she has been with the Fac­ulty of the Electrical and Computer Engineering Department, the Institute of Advanced Computer Studies, and the Institute of Systems Research at the University of Maryland, College Park. Her research interests include in­formation security, signal processing, and multimedia communications. She received an NSF CAREER award for her research on information security and protection in 2002 and holds three U.S. patents on multimedia data hiding. She is a member of the IEEE and the IEEE Technical Committee on Multimedia Signal Processing. More information about her research can be found at http://www.ece.umd.edu/ "'minwu/ research.html .

Bede Liu received the B.S. degree in E.E. from National Taiwan Uni­versity and the M.E.E. and D.E.E. degrees from the Polytechnic Institute of Brooklyn. Prior to joining the Princeton University Faculty in 1962, his industrial associations included Bell Laboratories, Allen B. DuMont Labora­tory, and Western Electric Company. His current research interests include signal and image processing, video coding and analysis. He was the IEEE President of the Circuits and Systems Society and a member of the IEEE Board of Directors. He received the IEEE Centennial Medal (1984), the IEEE Acoustic, Speech, and Signal Processing Society Technical Achieve­ment Award (1985), the IEEE Circuits and Systems Society Education Award (1988), two Best Paper Awards from IEEE Transactions of Cir­cuits and Systems on Video Technology (1994 and 1996), the IEEE Mac­Van Valkenburg Award (1997), the IEEE Third Millennium Medal (2000), the IEEE Circuits and Systems Society Golden Jubilee Award (2000), and the IEEE Signal Processing Society Award (2000). He is an IEEE Fellow and a member of the U.S. National Academy of Engineering. More infor­mation about his research can be found at http://www.ee.princeton.edu/ people/Liu.php .