You are previewing Multimedia Information Hiding Technologies and Methodologies for Controlling Data.
O'Reilly logo
Multimedia Information Hiding Technologies and Methodologies for Controlling Data

Book Description

The widespread use of high-speed networks has made the global distribution of digital media contents readily available in an instant. As a result, data hiding was created in an attempt to control the distribution of these copies by verifying or tracking the media signals picked up from copyright information, such as the author or distributor ID. Multimedia Information Hiding Technologies and Methodologies for Controlling Data presents the latest methods and research results in the emerging field of Multimedia Information Hiding (MIH). This comprehensive collection is beneficial to all researchers and engineers working globally in this field and aims to inspire new graduate-level students as they explore this promising field.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Foreword
  6. Preface
    1. CONTENTS OF THE BOOK
  7. Acknowledgment
  8. Section 1: Information Hiding for Audio and Speech
    1. Chapter 1: Information Hiding for Audio Signals
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITION OF INFORMATION-HIDING FOR AUDIO
      4. PERFORMANCE EVALUATION
      5. AUDIO DATA HIDING ALGORITHM
      6. DATA HIDING METHODS PROPOSED AT THE MIH RESEARCH GROUP MEETINGS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    2. Chapter 2: Reversible Audio Data Hiding in Spectral and Time Domains
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. REVERSIBLE DATA HIDING IN THE SPECTRAL DOMAIN
      5. REVERSIBLE DATA HIDING IN THE TIME DOMAIN
      6. DISCUSSION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 3: Method of Digital-Audio Watermarking Based on Cochlear Delay Characteristics
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCEPT UNDERLYING INAUDIBLE WATERMARKING
      4. COCHLEAR DELAY-BASED WATERMARKING
      5. EVALUATIONS
      6. EXTENDED METHOD
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    4. Chapter 4: Information Hiding Using Interpolation for Audio and Speech Signals
      1. ABSTRACT
      2. INTRODUCTION
      3. INFORMATION-HIDING METHOD WITH INTERPOLATION
      4. IMPLEMENTATION EXAMPLES AND THEIR PERFORMANCE
      5. DISCUSSION
      6. SUMMARY
    5. Chapter 5: Acoustic OFDM Technology and System
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ACOUSTIC OFDM TECHNOLOGY
      5. ACOUSTIC OFDM SYSTEM
      6. SUBJECTIVE QUALITY TEST
      7. PERFORMANCE MEASUREMENTS
      8. ROBUST ACOUSTIC OFDM
      9. CONCLUSION
    6. Chapter 6: Data Hiding for Stereo Audio Signals
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DATA HIDING FOR STEREO AUDIO USING DATA-DEPENDENT INTERCHANNEL DELAY
      5. DATA HIDING FOR STEREO AUDIO USING INTERCHANNEL ECHO POLARITY
      6. EMBEDDED DATA BIT RATE
      7. ROBUSTNESS EVALUATION
      8. EMBEDDED AUDIO QUALITY EVALUATION
      9. DISCUSSION
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    7. Chapter 7: Advanced Information Hiding for G.711 Telephone Speech
      1. ABSTRACT
      2. INTRODUCTION
      3. LSB SUBSTITUTION FOR G.711-CODED SPEECH
      4. ENHANCEMENT OF LSB SUBSTITUTION BASED ON ESTIMATION OF TOLERABLE DISTORTION
      5. EVALUATION OF THE PROPOSED METHOD
      6. BIT RATE CONTROL OF PAYLOAD
      7. FIXED BIT RATE DATA HIDING USING MULTIPLE LSBS
      8. APPLICATION OF THE DATA HIDING METHOD TO BAND EXTENSION OF G.711 SPEECH
      9. CONCLUSION
    8. Chapter 8: Enhancement of Speech Quality in Telephony Communications by Steganography
      1. ABSTRACT
      2. INTRODUCTION
      3. STEGANOGRAPHY FOR TELEPHONY SPEECH
      4. SELECTIVE LSB REPLACEMENT TECHNIQUE
      5. A PACKET LOSS CONCEALMENT TECHNIQUE BY USING STEGANOGRAPHY
      6. A BAND EXTENSION TECHNIQUE BY USING STEGANOGRAPHY
      7. DISCUSSION
      8. CONCLUSION
    9. Chapter 9: Spatial and Temporal Position Information Delivery to Mobile Terminals Using Audio Watermarking Techniques
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROPOSED BASIC WATERMARK TECHNOLOGY
      5. PROPOSED MAIN FUNCTIONS OF POSITION INFORMATION DELIVERY
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
  9. Section 2: Information Hiding for Images and Video
    1. Chapter 10: Introduction to Image Steganography and Steganalysis
      1. ABSTRACT
      2. QUICK SUMMARY OF IMAGE DATA AND FORMAT
      3. INFORMATION HIDING IN IMAGE DATA
      4. STEGANALYSIS OF IMAGE DATA
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 11: Reversible Information Hiding and Its Application to Image Authentication
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE LOCATION MAP-FREE PEE-RIH
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    3. Chapter 12: New Proposals for Data Hiding in Paper Media
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SINGLE DOT PATTERN
      5. ARTIFICIAL FIBER PATTERN
      6. CONCLUSION AND FUTURE RESEARCH
    4. Chapter 13: Watermarking for Still Images Using a Computation of the Watermark Weighting Factor and the Human Visual System in the DCT Domain
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PREVIOUS WORKS
      5. PROPOSED METHOD
      6. CONCLUSION
    5. Chapter 14: Self-Embedding Watermarking with Content Restoration Capabilities
      1. ABSTRACT
      2. 1. BACKGROUND
      3. 2. PRELIMINARIES
      4. 3. STATE OF THE ART
      5. 4. CONCLUSION
    6. Chapter 15: A Benchmark Tool for Digital Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. ATTACKS ON DIGITAL WATERMARKING
      4. EXISTING BENCHMARK TOOLS
      5. FEATURES OF OUR NEWLY DEVELOPED BENCHMARK TOOL
      6. FUNCTIONS OF OUR BENCHMARK TOOL
      7. EXAMPLES OF EVALUATION RESULTS
      8. CONCLUSION
  10. Section 3: Information Hiding for Text and Binary Data
    1. Chapter 16: Data Hiding for Text and Binary Files
      1. ABSTRACT
      2. INTRODUCTION
      3. TEXT DATA HIDING METHODS
      4. BINARY DATA HIDING METHODS
      5. SUMMARY
    2. Chapter 17: Data Embedding Methods Not Based on Content Modification
      1. ABSTRACT
      2. INTRODUCTION
      3. PERMUTATION STEGANOGRAPHY
      4. METADATA STEGANOGRAPHY
      5. COVER GENERATION METHOD
      6. SUMMARY
  11. Section 4: New Directions in Multimedia Information Hiding
    1. Chapter 18: Data-Embedding Pen
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. THE DATA-EMBEDDING PEN
      5. INFORMATION EMBEDDING
      6. INFORMATION RECOVERY
      7. EXPERIMENT ON SIMPLE HANDRWITINGS
      8. APPLICATIONS
      9. CONCLUSION
    2. Chapter 19: Multimedia Copyright Protection Scheme Based on the Direct Feature-Based Method
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUNDAMENTAL KNOWLEDGE
      5. MULTIMEDIA COPYRIGHT PROTECTION
      6. ROBUSTNESS AND SECURITY
      7. DISCUSSION
      8. CONCLUSION AND FUTURE DIRECTIONS
  12. Compilation of References
  13. About the Contributors