Abstract
The successes of the Internet and digital consumer devices have been profoundly changing our society and daily lives by making the capture, transmission, and storage of digital data extremely easy and convenient. However, this raises large concern on how to secure these data and prevent unauthorized modification. This issue has become problematic in many areas, such as copyright protection including (Schyndel et al., 1994; Pitas, 1996; Swanson et al., 1996; Xia et al., 1997), content authentication (Yeo and Kim, 2001; Cvejic and Tujkovic, 2004), hiding of information (Tanaka et al., 1990), and covered communications (Chen and Wornell, 2001). Digital watermarking technologies are considered to be an effective means to address this issue. Many researchers have developed various algorithms of digital watermarking methods which intend to embed some secret data (called watermark) in digital content to mark or seal the digital data content, such as (Cox et al., 1997; Podilchuk and Zeng, 1998; Kaewkamnerd and Rao, 2000; Piva et al., 2000; Reed and Hannigan, 2002; 142 Bas et al., 2003; Shih and Wu, 2003; Shih, 2008; Tsui et al., 2008; Sachnev et al., 2009; Wei and Ngan, 2009; Yang et al., 2009; Luo et al., 2010; Wu and Cheung, 2010). The watermark embedded into a host image is such that the embeddinginduced distortion is too small to be noticed. At the same time, the embedded watermark must be robust enough to withstand common degradations or deliberate attacks.
Original language | English (US) |
---|---|
Title of host publication | Multimedia Security |
Subtitle of host publication | Watermarking, Steganography, and Forensics |
Publisher | CRC Press |
Pages | 141-163 |
Number of pages | 23 |
ISBN (Electronic) | 9781439873328 |
ISBN (Print) | 9781439873311 |
DOIs | |
State | Published - Jan 1 2017 |
All Science Journal Classification (ASJC) codes
- General Computer Science
- General Engineering