|
Showing 1 - 3 of
3 matches in All Departments
Digital audio, video, images, and documents are flying through
cyberspace to their respective owners. Unfortunately, along the
way, individuals may choose to intervene and take this content for
themselves. Digital watermarking and steganography technology
greatly reduces the instances of this by limiting or eliminating
the ability of third parties to decipher the content that he has
taken. The many techiniques of digital watermarking (embedding a
code) and steganography (hiding information) continue to evolve as
applications that necessitate them do the same. The authors of this
second edition provide an update on the framework for applying
these techniques that they provided researchers and professionals
in the first well-received edition. Steganography and steganalysis
(the art of detecting hidden information) have been added to a
robust treatment of digital watermarking, as many in each field
research and deal with the other. New material includes
watermarking with side information, QIM, and dirty-paper codes. The
revision and inclusion of new material by these influential authors
has created a must-own book for anyone in this profession.
*This new edition now contains essential information on
steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new
processes and applications
It is an honor and great pleasure to write a preface for this
postproceedings of the 6th International Workshop on Information
Hiding. In the past 10 years, the field of data hiding has been
maturing and expanding, gradually establishing its place as an
active interdisciplinary research area uniquely combining
information theory, cryptology, and signal processing. This year,
the workshop was followed by the Privacy Enhancing Technologies
workshop (PET) hosted at the same location. Delegates viewed this
connection as fruitful as it gave both communities a convenient
opportunity to interact. We would like to thank all authors who
submitted their work for consideration. Out of the 70 submisions
received by the program committee, 25 papers were accepted for
publication based on their novelty, originality, and scientific
merit. We strived to achieve a balanced exposition of papers that
would represent many different aspects of information hiding. All
papers were divided into eight sessions: digital media
watermarking, steganalysis, digital forensics, steganography,
software watermarking, security and privacy, anonymity, and data
hiding in unusual content. This year, the workshop included a
one-hour rump session that offered an opportunity to the delegates
to share their work in progress and other brief but interesting
contributions.
Steganography, the art of hiding of information in apparently
innocuous objects or images, is a field with a rich heritage, and
an area of rapid current development. This clear, self-contained
guide shows you how to understand the building blocks of covert
communication in digital media files and how to apply the
techniques in practice, including those of steganalysis, the
detection of steganography. Assuming only a basic knowledge in
calculus and statistics, the book blends the various strands of
steganography, including information theory, coding, signal
estimation and detection, and statistical signal processing.
Experiments on real media files demonstrate the performance of the
techniques in real life, and most techniques are supplied with
pseudo-code, making it easy to implement the algorithms. The book
is ideal for students taking courses on steganography and
information hiding, and is also a useful reference for engineers
and practitioners working in media security and information
assurance.
|
|