Techniques and Applications of Digital Watermarking and Content Protection

Front Cover
Artech House, Dec 31, 2002 - Computers - 274 pages
1 Review
This informative, new resource presents the first comprehensive treatment of silicon-germanium heterojunction bipolar transistors (SiGe HBTs). It offers you a complete, from-the-ground-up understanding of SiGe HBT devices and technology, from a very broad perspective. The book covers motivation, history, materials, fabrication, device physics, operational principles, and circuit-level properties associated with this new cutting-edge semiconductor device technology. Including over 400 equations and more than 300 illustrations, this hands-on reference shows you in clear and concise language how to design, simulate, fabricate, and measure a SiGe HBT.
 

What people are saying - Write a review

User Review - Flag as inappropriate

this is book is very good covering basic concepts of digitalmarketing.

Contents

Introduction
1
11 The origins of copyright protection
3
12 The protection of intellectual property through technical means
5
13 Integrity and authenticity
11
Digital watermarking
15
22 Digital watermarking and cryptography
16
222 Digital watermarking
19
231 Basic principles of watermarking
20
623 Operations and attacks
124
624 Algorithms
125
625 Quality
135
63 Digital watermarking for twodimensional geometry data
136
641 Application requirements
137
65 Music scores
138
652 Algorithms
139
References
140

232 Terminology
21
233 First methods
23
24 Beyond the first generation
32
References
35
Applications of digital watermarking
39
32 Copyright protection
40
321 Misappropriation by other content providers
41
322 Illicit use by end users
44
33 Annotation watermarking
46
34 Fingerprinting
48
35 Automatic playlist generation for rights verification
49
36 Multimedia authentication
50
37 Watermarking for copy protection
51
References
53
Digital watermarking for still images
55
42 Photographic and photorealistic images
56
422 Watermarking methods dealing with geometric distortions
63
423 Contentbased watermarking methods
65
43 Binary and halftoned images
67
44 Summary
69
Digital watermarking for audio data
75
511 Removal manipulations and attacks
76
52 Psychoacoustic facts and models
77
521 Critical bands
78
522 Masking effects
79
523 Psychoacoustic model MPEG 1 layers I and II
81
53 Perceptual audio watermarking
88
531 Spectral weighting
89
54 Algorithms
90
541 LSB coding
91
543 Echo hiding
96
544 Watermarking of compressed audio data
99
545 Spreadspectrum audio watermarking
102
546 Audio watermarking via the patchwork technique
106
547 Mechanisms against desynchronization manipulations
107
References
111
Digital watermarking for other media
115
612 Algorithms
117
62 Digital watermarking for threedimensional data
121
622 Data representation
122
Attacks and benchmarks of digital watermarking systems
147
71 Threats and risk analysis
148
72 Attacks
149
722 Removal attacks and manipulations
151
723 Desynchronization attacks
159
724 Embedding attacks
164
725 Detection attacks
168
731 Psychophysical methods
169
732 Audio data
172
733 Image data
176
734 Video data
177
74 Benchmarking
178
741 Concepts
180
742 Automatic evaluation of watermarking algorithms
181
References
187
Other content protection mechanisms
193
82 Analog media protection
197
821 Fingerprinting
200
83 Offline digital content protection
201
831 Cryptographic mechanisms
204
References
208
Integrated content protection solutions
211
911 The Digital Transmission Content Protection Specification
216
912 The Trusted Computing Platform Alliance System architecture
218
913 The CIPRESS system
221
914 Pragmatic aspects of digital rights management
225
92 Tamper protection
228
922 Techniques for hardware tamper protection
230
References
237
Conclusion
245
1011 Privacy competition and freedom of speech
246
1012 DRM in commercial environments
248
102 Digital watermarking
250
103 Outlook
251
References
252
Glossary
255
List of acronyms
257
About the authors
263
Index
265
Copyright

Other editions - View all

Common terms and phrases

About the author (2002)

Michael Arnold earned a masters degree in physics at Bavarian Julius-Maximilians-University, Würzburg, Germany. Arnold heads the digital watermarking group at Fraunhofer-IGD, Darmstadt, Germany.

Martin Schmucker earned a masters degree in computer science at the University of Ulm, Germany. Schmucker works for Fraunhofer-IGD, Darmstadt, Germany.

Stephen D. Wolthusen earned a masters degree in computer science at the University of Darmstadt. Wolthusen heads the information assurance group at Fraunhofer-IGD, Darmstadt, Germany.

Bibliographic information