000 | 04014nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-3-031-02342-2 | ||
003 | DE-He213 | ||
005 | 20240730163455.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2014 sz | s |||| 0|eng d | ||
020 |
_a9783031023422 _9978-3-031-02342-2 |
||
024 | 7 |
_a10.1007/978-3-031-02342-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aNaskar, Ruchira. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _978767 |
|
245 | 1 | 0 |
_aReversible Digital Watermarking _h[electronic resource] : _bTheory and Practices / _cby Ruchira Naskar, Rajat Subhra Chakraborty. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 106 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aIntroduction -- Motivational Case Studies -- Overview of State-of-the-Art ReversibleWatermarking Techniques -- Detailed Working of a Reversible Watermarking Algorithm: A Technique Utilizing Weighted Median-Based Prediction -- Addressing Implementation Issues -- ReversibleWatermarking with Tamper Localization Property -- Looking Forward -- Bibliography -- Authors' Biographies. | |
520 | _aDigital Watermarking is the art and science of embedding information in existing digital content for Digital Rights Management (DRM) and authentication. Reversible watermarking is a class of (fragile) digital watermarking that not only authenticates multimedia data content, but also helps to maintain perfect integrity of the original multimedia "cover data." In non-reversible watermarking schemes, after embedding and extraction of the watermark, the cover data undergoes some distortions, although perceptually negligible in most cases. In contrast, in reversible watermarking, zero-distortion of the cover data is achieved, that is the cover data is guaranteed to be restored bit-by-bit. Such a feature is desirable when highly sensitive data is watermarked, e.g., in military, medical, and legal imaging applications. This work deals with development, analysis, and evaluation of state-of-the-art reversible watermarking techniques for digital images. In this work we establish the motivation for research on reversible watermarking using a couple of case studies with medical and military images. We present a detailed review of the state-of-the-art research in this field. We investigate the various subclasses of reversible watermarking algorithms, their operating principles, and computational complexities. Along with this, to give the readers an idea about the detailed working of a reversible watermarking scheme, we present a prediction-based reversible watermarking technique, recently published by us. We discuss the major issues and challenges behind implementation of reversible watermarking techniques, and recently proposed solutions for them. Finally, we provide an overview of some open problems and scope of work for future researchers in this area. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aChakraborty, Rajat Subhra. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _978768 |
|
710 | 2 |
_aSpringerLink (Online service) _978769 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012143 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034701 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _978770 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02342-2 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c84651 _d84651 |