Techniques and Applications of Digital Watermarking and Content Protection

Free Download

Authors:

Edition: 2nd edition

Series: Artech House computer security series

ISBN: 9781580531115, 1-58053-111-3

Size: 10 MB (10691368 bytes)

Pages: 290/290

File format:

Language:

Publishing Year:

Category:

Michael Arnold, Stephen D. Wolthusen, Martin Schmucker9781580531115, 1-58053-111-3

Experts with the Fraunhofer Institute for Computer Graphics in Darmstadt, Germany not only introduce digital watermarking and related media-specific security techniques, but also the intellectual property protection context in which such methods are applied. They also discuss the limitations of current technologies and future research directions, and provide examples of digital rights management systems. Chapters can be read in sequence or as self- contained units. Includes extensive references and a glossary.

Table of contents :
Team DDU……Page 1
Contents……Page 8
Preface……Page 14
Acknowledgments……Page 16
1 Introduction……Page 17
1.1 The origins of copyright protection……Page 19
1.2 The protection of intellectual property through technical means……Page 21
1.3 Integrity and authenticity……Page 27
References……Page 28
2.1 Rationale……Page 31
2.2.1 Steganography……Page 32
2.3 First generation approaches……Page 35
2.3.1 Basic principles of watermarking……Page 36
2.3.2 Terminology……Page 37
2.3.3 First methods……Page 39
2.4 Beyond the first generation……Page 48
References……Page 51
3.1 Usage-specific requirements……Page 55
3.2 Copyright protection……Page 56
3.2.1 Misappropriation by other content providers……Page 57
3.2.2 Illicit use by end users……Page 60
3.3 Annotation watermarking……Page 62
3.4 Fingerprinting……Page 64
3.5 Automatic playlist generation for rights verification……Page 65
3.6 Multimedia authentication……Page 66
3.7 Watermarking for copy protection……Page 67
References……Page 69
4.1 Classification and application requirements……Page 71
4.2.1 Traditional watermarking methods……Page 72
4.2.2 Watermarking methods dealing with geometric distortions……Page 79
4.2.3 Content-based watermarking methods……Page 81
4.3 Binary and halftoned images……Page 83
References……Page 85
5.1 Requirements and design……Page 91
5.1.2 Misalignment manipulations and attacks……Page 92
5.2 Psychoacoustic facts and models……Page 93
5.2.1 Critical bands……Page 94
5.2.2 Masking effects……Page 95
5.2.3 Psychoacoustic model MPEG 1 layers I and II……Page 97
5.3 Perceptual audio watermarking……Page 104
5.3.1 Spectral weighting……Page 105
5.4 Algorithms……Page 106
5.4.2 Embedding watermarks into the phase……Page 107
5.4.3 Echo hiding……Page 112
5.4.4 Watermarking of compressed audio data……Page 115
5.4.5 Spread-spectrum audio watermarking……Page 118
5.4.6 Audio watermarking via the patchwork technique……Page 122
5.4.7 Mechanisms against desynchronization manipulations……Page 123
References……Page 127
6.1.1 Application requirements……Page 131
6.1.2 Algorithms……Page 133
6.2.1 Application requirements……Page 137
6.2.2 Data representation……Page 138
6.2.3 Operations and attacks……Page 140
6.2.4 Algorithms……Page 141
6.2.5 Quality……Page 151
6.4 Digital watermarking for formatted text……Page 152
6.4.2 Algorithms……Page 153
6.5.1 Application requirements……Page 154
6.5.2 Algorithms……Page 155
References……Page 156
7 Attacks and benchmarks of digital watermarking systems……Page 163
7.1 Threats and risk analysis……Page 164
7.2.1 Classification of attacks……Page 165
7.2.2 Removal attacks and manipulations……Page 167
7.2.3 Desynchronization attacks……Page 175
7.2.4 Embedding attacks……Page 180
7.3 Quality evaluation of watermarked objects……Page 184
7.3.1 Psychophysical methods……Page 185
7.3.2 Audio data……Page 188
7.3.3 Image data……Page 192
7.3.4 Video data……Page 193
7.4 Benchmarking……Page 194
7.4.1 Concepts……Page 196
7.4.2 Automatic evaluation of watermarking algorithms……Page 197
References……Page 203
8.1 Copy and usage protection schemes……Page 209
8.2 Analog media protection……Page 213
8.2.1 Fingerprinting……Page 216
8.3 Off-line digital content protection……Page 217
8.3.1 Cryptographic mechanisms……Page 220
References……Page 224
9.1 Digital rights management……Page 227
9.1.1 The Digital Transmission Content Protection Specification……Page 232
9.1.2 The Trusted Computing Platform Alliance System architecture……Page 234
9.1.3 The CIPRESS system……Page 237
9.1.4 Pragmatic aspects of digital rights management……Page 241
9.2.1 Techniques for software tamper protection……Page 244
9.2.2 Techniques for hardware tamper protection……Page 246
References……Page 253
10.1 Digital rights management systems……Page 261
10.1.1 Privacy, competition, and freedom of speech……Page 262
10.1.2 DRM in commercial environments……Page 264
10.2 Digital watermarking……Page 266
10.3 Outlook……Page 267
References……Page 268
Glossary……Page 271
List of acronyms……Page 273
About the authors……Page 279
Index……Page 281

Reviews

There are no reviews yet.

Be the first to review “Techniques and Applications of Digital Watermarking and Content Protection”
Shopping Cart
Scroll to Top