Vous êtes sur la page 1sur 1

Digital Watermarking and Steganography

UNIT I
Introduction :Information Hiding, Steganography, and Watermarking. History of
Watermarking. History of Steganography, Importance of Digital Watermarking. Importance
of Steganography .

UNIT II Properties of Watermarking and Steganography
Properties of Watermarking Systems, Embedding Effectiveness, Fidelity,Data Payload, Blind
or Informed Detection, False Positive Rate, Robustness, Security,Cipher and Watermark
Keys, Modification and Multiple Watermarks, Cost, Evaluating Watermarking Systems, The
Notion of Best , Benchmarking, Scope of Testing.
Properties of Steganographic and Steganalysis Systems : Embedding , Steganographic
Capacity, Embedding Capacity, Embedding Efficiency, and Data Payload, Blind or Informed
Extraction, Blind or Targeted Steganalysis, Statistical Undetectability, False Alarm Rate,
Robustness, Security, Stego Key, Evaluating and Testing Steganographic Systems, Summary.

UNIT III
Models of Watermarking : Notation, Communications, Components of Communications
Systems, Classes of Transmission Channels, Secure Transmission, Communication-Based
Models of Watermarking, Basic Model, Watermarking as Communications with Side
Information at the Transmitter, Watermarking as Multiplexed Communications, Geometric
Models of Watermarking, Distributions and Regions in Media Space, Marking Spaces,
Modeling Watermark Detection by Correlation, Linear Correlation, Normalized Correlation,
Correlation Coefficient, Summary.

UNIT IV
Steganography : Steganographic Communication, The Channel, The Building Blocks,
Notation and Terminology, Information-Theoretic Foundations of Steganography, Cachins
Definition of Steganographic Security, Practical Steganographic Methods, Statistics
Preserving Steganography, Model-Based Steganography, Masking Embedding as Natural
Processing, Minimizing the Embedding Impact, Matrix Embedding, Nonshared Selection
Rule, Summary.

UNIT V
Steganalysis : Steganalysis Scenarios, Detection, Forensic Steganalysis, The Influence of
the Cover Work on Steganalysis, Some Significant Steganalysis Algorithms, LSB Embedding
and the Histogram Attack, Sample Pairs Analysis, Blind Steganalysis of JPEG Images Using
Calibration, Blind Steganalysis in the Spatial Domain, Summary.

UNIT VI
Applications :Applications of Watermarking, Broadcast Monitoring, Owner Identification
,Proof of Ownership, Transaction Tracking, Content Authentication, Copy Control, Device
Control, Legacy Enhancement.Applications of Steganography, Steganography for Dissidents,
Steganography for Criminals,

TEXT BOOKS:
1. Digital Watermarking and Steganography, Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica
Fridrich, and Ton Kalker. 2
nd
Edition, Morgan Kaufmann Publishers, 2008.

Vous aimerez peut-être aussi