2nd Edition

Digital Watermarking and Steganography
Fundamentals and Techniques, Second Edition

ISBN 9781498738767
Published April 26, 2017 by CRC Press
292 Pages

USD $140.00

Prices & shipping based on shipping country


Book Description

This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the global scale of digital multimedia and the rapid growth of the Internet. Digital watermarking technology can be used to guarantee authenticity and can be applied as proof that the content has not been altered since insertion. Updated techniques and advances in watermarking are explored in this new edition. The combinational spatial and frequency domains watermarking technique provides a new concept of enlarging the embedding capacity of watermarks. The genetic algorithm (GA) based watermarking technique solves the rounding error problem and provide an efficient embedding approach. Each chapter provides the reader with a fundamental, theoretical framework, while developing the extensive advanced techniques and considering the essential principles of the digital watermarking and steganographic systems. Several robust algorithms that are presented throughout illustrate the framework and provide assistance and tools in understanding and implementing the fundamental principles.

Table of Contents




Chapter 1 Introduction

Chapter 2 Classification in Digital Watermarking

Chapter 3 Mathematical Preliminaries

Chapter 4 Digital Watermarking Fundamentals

Chapter 5 Watermarking Attacks and Tools

Chapter 6 Combinational Domain Digital Watermarking

Chapter 7 Watermarking Based on Genetic Algorithms

Chapter 8 Adjusted-Purpose Watermarking

Chapter 9 High-Capacity Watermarking

Chapter 10 Reversible Watermarking

Chapter 11 Steganography and Steganalysis

Chapter 12 Steganography Based on Genetic Algorithms and Differential Evolution


View More



Frank Y. Shih received the B.S. degree from National Cheng-Kung University, Taiwan, in 1980, the M.S. degree from the State University of New York at Stony Brook, in 1984, and the Ph.D. degree from Purdue University, West Lafayette, Indiana, in 1987, all in Electrical and Computer Engineering. He served as departmental acting chair, associate chair, director, principal investigator, journal editor, and conference chair. Currently, he is a professor jointly appointed in the Department of Computer Science, the Department of Electrical and Computer Engineering, and the Department of Biomedical Engineering at New Jersey Institute of Technology, Newark, NJ. Dr. Shih also serves as the Director of Computer Vision Laboratory. He held a visiting professor position at Princeton University, Columbia University, National Taiwan University, National Institute of Informatics, Tokyo, and Conservatoire National Des Arts Et Metiers, Paris.

Dr. Shih is a well-known scholar internationally, and he serves as the Editor-in-Chief for the Inter. Journal of Multimedia Intelligence and Security. In addition, he is on the Editorial Board of the International Journal of Pattern Recognition, the International Journal of Pattern Recognition Letters, the International Journal of Pattern Recognition and Artificial Intelligence, the International Journal of Recent Patents on Engineering, the International Journal of Recent Patents on Computer Science, the International Journal of Internet Protocol Technology, and the Journal of Internet Technology. He served as a steering member, committee member, and session chair for numerous professional conferences and workshops. Dr. Shih has received numerous grants from the National Science Foundation, Navy and Air Force, and Industry. He was the recipient of Research Initiation Award of NSF and Board of Overseers Excellence in Research Award of NJIT.

Furthermore, Dr. Shih has authored three books: "Digital Watermarking and Steganography", "Image Processing and Mathematical Morphology", and "Image Processing and Pattern Recognition." He also edited one book: "Multimedia Security: Watermarking, Steganography, and Forensics." He has published 122 journal papers, 96 conference papers, and 22 book chapters. His current research interests include image processing, computer vision, watermarking and steganography, digital forensics, sensor networks, pattern recognition, bioinformatics, information security, robotics, fuzzy logic, and neural networks.


"This book covers a wide range of the digital image data hiding field. Reversible and irreversible digital image watermarking techniques applied to spatial, frequency, and compressed domains are extensively presented. Especially, the author shows how intelligent techniques such as Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) can be applied to image watermarking. Also, machine learning techniques such as Support Vector Machines (SVMs), Artificial Neural Networks (ANNs), and Principle Component Analysis (PCA) applied to Steganalysis are considered. This book is highly recommended for students, researchers, and professionals who are interested and seeking for state-of-the-art and intelligent techniques in the watermarking and steganography field."
Duc The Kieu, The University of the West Indies, Trinidad and Tobago

"The materials covered by the book contain most of the important knowledge and techniques in the topic. The mentioned contents range from explanation of concepts to construction of processing systems. This comprehensive book should be of great interest to those learning watermarking and steganography."
I-Cheng Chang, National Dong Hwa University, Taiwan