Series introduction |
Preface |
Introduction / 1: |
Elements of a watermarking system / 1.1: |
Information coding / 1.1.1: |
Embedding / 1.1.2: |
Concealment / 1.1.3: |
Watermark impairments / 1.1.4: |
Recovery of the hidden information / 1.1.5: |
Protocol considerations / 1.2: |
Capacity of watermarking techniques / 1.2.1: |
Multiple embedding / 1.2.2: |
Robustness / 1.2.3: |
Blind vs. non-blind recovery / 1.2.4: |
Private vs. public watermarking / 1.2.5: |
Readable vs. detectable watermarks / 1.2.6: |
Invertibility and quasi-invertibility / 1.2.7: |
Reversibility / 1.2.8: |
Asymmetric watermarking / 1.2.9: |
Audio vs image vs video assets / 1.3: |
Further reading / 1.4: |
Applications / 2: |
IPR protection / 2.1: |
Demonstration of rightful ownership / 2.1.1: |
Fingerprinting / 2.1.2: |
Copy control / 2.1.3: |
Authentication / 2.2: |
Cryptography vs watermarking / 2.2.1: |
A general authentication framework / 2.2.2: |
Requirements of data-hiding-based authentication / 2.2.3: |
Data hiding for multimedia transmission / 2.3: |
Data compression / 2.3.1: |
Error recovery / 2.3.2: |
Annotation watermarks / 2.4: |
Labelling for data retrieval / 2.4.1: |
Bridging the gap between analog and digital objects / 2.4.2: |
Covert communications / 2.5: |
Information coding in detectable watermarking / 2.6: |
Spread spectrum watermarking / 3.1.1: |
Orthogonal waveforms watermarking / 3.1.2: |
Orthogonal vs PN watermarking / 3.1.3: |
Self-synchronizing PN sequences / 3.1.4: |
Power spectrum shaping / 3.1.5: |
Chaotic sequences / 3.1.6: |
Direct embedding / 3.1.7: |
Waveform-based readable watermarking / 3.2: |
Information coding through M-ary signaling / 3.2.1: |
Position encoding / 3.2.2: |
Binary signaling / 3.2.3: |
Direct embedding readable watermarking / 3.3: |
Direct embedding binary signalling with bit repetition / 3.3.1: |
Channel coding / 3.4: |
Block codes / 3.4.1: |
Convolutional codes / 3.4.2: |
Coding vs bit repetition / 3.4.3: |
Channel coding vs orthogonal signaling / 3.4.4: |
Informed coding / 3.4.5: |
Data embedding / 3.5: |
Feature selection / 4.1: |
Watermarking in the asset domain / 4.1.1: |
Watermarking in a transformed domain / 4.1.2: |
Hybrid techniques / 4.1.3: |
Watermarking in the compressed domain / 4.1.4: |
Miscellaneous non-conventional choices of the feature set / 4.1.5: |
Blind embedding / 4.2: |
Additive watermarking / 4.2.1: |
Multiplicative watermarking / 4.2.2: |
Informed embedding / 4.3: |
Detectable watermarking / 4.3.1: |
Readable watermarking / 4.3.2: |
Data concealment / 4.4: |
The Human Visual System / 5.1: |
The Weber law and the contrast / 5.1.1: |
The contrast sensitivity function / 5.1.2: |
The masking effect / 5.1.3: |
Mapping luminance to images / 5.1.4: |
Perception of color stimuli / 5.1.5: |
Perception of time-varying stimuli / 5.1.6: |
The Human Auditory System (HAS) / 5.2: |
Concealment through feature selection / 5.2.1: |
Concealment through signal adaptation / 5.4: |
Concealment through perceptual masks / 5.4.1: |
Concealment relying on visibility thresholds / 5.4.2: |
Heuristic approaches for still images / 5.4.3: |
A theoretically funded perceptual threshold for still images / 5.4.4: |
MPEG-based concealment for audio / 5.4.5: |
Application oriented concealment / 5.5: |
Video surveillance systems / 5.5.1: |
Remote sensing images / 5.5.2: |
Data recovery / 5.6: |
Watermark detection / 6.1: |
A hypothesis testing problem / 6.1.1: |
AWGN channel / 6.1.2: |
Additive / Generalized Gaussian channel / 6.1.3: |
Signal dependent noise with host rejection at the embedder / 6.1.4: |
Taking perceptual masking into account / 6.1.5: |
Multiplicative Gaussian channel / 6.1.6: |
Multiplicative Weibull channel / 6.1.7: |
Multichannel detection / 6.1.8: |
Decoding / 6.2: |
General problem for binary signalling / 6.2.1: |
Binary signaling through AWGN channel / 6.2.2: |
Generalized Gaussian channel / 6.2.3: |
Multiplicative watermarking with Gaussian noise / 6.2.4: |
Multiplicative watermarking of Weibull-distributed features / 6.2.5: |
Quantization Index Modulation / 6.2.6: |
Decoding in the presence of channel coding / 6.2.7: |
Assessment of watermark presence / 6.2.8: |
Watermark impairments and benchmarking / 6.3: |
Classification of attacks / 7.1: |
Measuring obtrusiveness and attack strength / 7.2: |
Gaussian noise addition / 7.3: |
Additive vs multiplicative watermarking / 7.3.1: |
Spread Spectrum vs QIM watermarking / 7.3.2: |
Conventional signal processing / 7.4: |
The gain attack / 7.4.1: |
Histogram equalization / 7.4.2: |
Filtering / 7.4.3: |
Lossy coding / 7.5: |
Quantization of the watermarked features / 7.5.1: |
Geometric manipulations / 7.6: |
Asset translation / 7.6.1: |
Asset zooming / 7.6.2: |
Image rotation / 7.6.3: |
More complex geometric transformations / 7.6.4: |
Countermeasures against geometric manipulations / 7.6.5: |
Editing / 7.7: |
Digital to analog and analog to digital conversion / 7.8: |
Malicious attacks / 7.9: |
Attack estimation / 7.10: |
Benchmarking / 7.11: |
Early benchmarking systems / 7.11.1: |
StirMark / 7.11.2: |
Improving conventional systems / 7.11.3: |
A new benchmarking structure / 7.11.4: |
Security issues / 7.12: |
Security by obscurity / 8.1: |
The symmetric case / 8.2: |
The asymmetric case / 8.3: |
Playing open cards / 8.4: |
Security based on protocol design / 8.5: |
An information theoretic perspective / 8.6: |
Some historical notes / 9.1: |
The watermarking game / 9.2: |
The rules of the game / 9.2.1: |
Some selected results / 9.2.2: |
Capacity under average distortion constraints / 9.2.3: |
The additive attack watermarking game / 9.3: |
Game definition and main results / 9.3.1: |
Costa's writing on dirty paper / 9.3.2: |
Lattice-based capacity-achieving watermarking / 9.4: |
Equi-energetic structured code-books / 9.5: |
Bibliography / 9.6: |
Index |
Series introduction |
Preface |
Introduction / 1: |
Elements of a watermarking system / 1.1: |
Information coding / 1.1.1: |
Embedding / 1.1.2: |