Instant ebooks textbook (Ebook) Digital Image Watermarking: Theoretical and Computational Advances (Intelligent Signal Processing and Data Analysis) by Borra, Surekha, Thanki, Rohit, Dey, Nilanjan ISBN 9781138390638, 1138390631 download all chapters
Instant ebooks textbook (Ebook) Digital Image Watermarking: Theoretical and Computational Advances (Intelligent Signal Processing and Data Analysis) by Borra, Surekha, Thanki, Rohit, Dey, Nilanjan ISBN 9781138390638, 1138390631 download all chapters
com
DOWLOAD EBOOK
ebooknice.com
ebooknice.com
https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018
ebooknice.com
ebooknice.com
(Ebook) Cambridge IGCSE and O Level History Workbook 2C -
Depth Study: the United States, 1919-41 2nd Edition by
Benjamin Harrison ISBN 9781398375147, 9781398375048,
1398375144, 1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044
ebooknice.com
ebooknice.com
ebooknice.com
https://ebooknice.com/product/data-analysis-digital-signal-and-image-
processing-2108158
ebooknice.com
ebooknice.com
Digital Image
Watermarking
Theoretical and Computational
Advances
Intelligent Signal Processing and Data Analysis
Series Editor
Dr. Nilanjan Dey
Department of Information Technology,
Techno India College of Technology, West Bengal, India
By
Surekha Borra, Rohit Thanki, and
Nilanjan Dey
MATLAB ® and Simulink® are trademarks of The MathWorks, Inc. and are used with permission.
The MathWorks does not warrant the accuracy of the text or exercises in this book. This book’s use
or discussion of MATLAB ® and Simulink® software or related products does not constitute endorse-
ment or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the
MATLAB ® and Simulink® software.
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors
and publishers have attempted to trace the copyright holders of all material reproduced in this publi-
cation and apologize to copyright holders if permission to publish in this form has not been obtained.
If any copyright material has not been acknowledged, please write and let us know so we may rectify
in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known
or hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a photo-
copy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Prefaceix
Authorsxi
Abbreviationsxiii
Chapter 1 ▪ Introduction 1
1.1 DIGITAL RIGHTS MANAGEMENT 2
1.2 DIGITAL IMAGE WATERMARKING 4
1.3 CLASSIFICATION OF COPYRIGHT MARKING 5
1.4 GENERAL FRAMEWORK OF DIGITAL
WATERMARKING11
1.5 PERFORMANCE CRITERIA 12
1.6 PERFORMANCE METRICS 15
1.7 ATTACKS ON WATERMARKS 16
1.8 DIGITAL IMAGE WATERMARKING TOOLS 19
REFERENCES 22
v
vi ◾ Contents
INDEX157
Preface
ix
x ◾ Preface
Surekha Borra
Rohit Thanki
Nilanjan Dey
xi
xii ◾ Authors
xiii
xiv ◾ Abbreviations
Introduction
1
2 ◾ Digital Image Watermarking
WC = C + k ´ w (1.1)
WC = C ∗ (1 + k × w) (1.2)
1.4 GENERAL FRAMEWORK OF
DIGITAL WATERMARKING
Digital copyright watermarking enables us to bring copyright
violators to court, as the embedded copyright mark in any legally
published/sold image is retained and can be extracted in any cop-
ies made. Digital image watermarking is a process of embedding a
watermark into the image so as to extract it at a later stage to detect
ownership identity. Figure 1.2 shows a generalized block diagram
of robust invisible image watermarking. The host is the raw digi-
tal image that has to be protected by inserting the watermark. The
watermark can be a message/logo/statistical pattern inserted into
the host that has some relevance to the host. The general framework
of digital image watermarking and the copyright authentication
process is composed of three major components: (1) the embedder,
(2) the extractor, and (3) the correlator. The watermark may be
encrypted before its insertion into the host image. In such cases,
the extracted watermark has to be decrypted before it is compared
to the original to make an assertion about ownership. All the com-
ponents may be hardware units or software programs.
The embedder (E) is a function of the host image (C), secret key
(K), and one or more watermarks (W). The watermark W may be a
random sequence or a meaningful message or image, such as logo
or copyright information. The embedder outputs a watermarked
image (WC) such that WC = E (C, K, W). The produced water-
marked image (WC) can be stored, transmitted, or published. The
owner must extract the watermark in order to prove ownership.
The watermark extraction process may or may not be the inverse
of embedding. The extractor function (D) accepts a secret key (K),
test image (T), and/or the original nonwatermarked image (C)
and original watermark (W) to detect the watermark (W′) such
that W′ = D (K, T, C, W). The test image can be the watermarked
image (WC), an attacked image (AC), a nonwatermarked origi-
nal image (C), or some other unauthorized image. The detected
watermark (W′) is correlated with the original to obtain a similar-
ity score (Abdelhakim et al., 2018). The correlator outputs 1 if the
similarity score exceeds a predefined threshold indicating that the
watermark is verified and the image is authenticated. A public/
private key is used in the embedding and extraction process to
achieve confidentiality. The process involved in embedder/extrac-
tor and the inputs/outputs to these components vary depending
on the type of watermarking and application.
1.5 PERFORMANCE CRITERIA
The performance of image watermarking and its evaluation
depend on several factors, such as the type of host image and
application. The subjective and objective analysis helps in identi-
fying how well the watermark is hidden in the host image with-
out being perceived by the human eye. The general performance
criteria and essential requirements of any invisible robust image
Introduction ◾ 13
"The inside of the coach contains only four places. The seat
of the coachman, and another seat placed immediately
behind it, admit of six persons, and two seats facing each
other, at the hind wheels, afford places for six or eight more.
These seats are fixed over boots or boxes for stowing away
the luggage. Such parcels as these cannot contain are placed
on the imperial.
"6. That they are not (or need not be, if properly
constructed) nuisances to the public.
"7. That they will become a speedier and cheaper mode of
conveyance than carriages drawn by horses.
Chorus.
"'William Clayton.
"'Witnesses: Joseph Gordon, G. Wood, George Whalley.'"
"Now I have shown you the dark side of my wife, and told
you her faults and her failings, I will introduce the bright and
sunny side of her, and explain her qualifications and her
goodness. She can read novels and milk cows; she can laugh
and weep with the same ease that you can take a glass of ale
when thirsty; indeed, gentlemen, she reminds me of what the
poet says of women in general—
"She can make butter and scold the maid; she can sing
Moore's Melodies, and plait her frills and caps; she cannot
make rum, gin, or whisky, but she is a good judge of the
quality from long experience in tasting them. I therefore offer
her, with all her perfections and imperfections, for the sum of
50s.
"After an hour or two, she was purchased by Henry Mears,
a pensioner, for the sum of 20s. and a Newfoundland dog.
The happy people immediately left town together, amidst the
shouts and huzzas of the multitude, in which they were joined
by Thompson, who, with the greatest good humour
imaginable, proceeded to put the halter which his wife had
taken off round the neck of his Newfoundland dog, and then
proceeded to the first public-house, where he spent the
remainder of the day."
"Next day came, and found the seller, the purchaser, and
their witnesses once more assembled, discussing at once the
terms of agreement and a can of grog. Some of the witnesses
seemed to think that the joke was carried far enough, and
proposed that the whole proceedings should be nullified on
the host forfeiting £1, to be 'melted,' in the house; but the
host was too well up to trap to be wheedled out of his £20,
and saddled with his wife to boot; he therefore persisted in
the fulfilment of the contract, and, as the purchaser was
equally averse to a rue bargain, arrangements were put in
operation to complete the transaction.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebooknice.com