Enlaces y libros recomendados
 
 

Information hiding techniques for steganography and digital watermarking
 
Information hiding techniques for steganography and digital watermarking
Stefan Katzenbeisser, 
Fabien A. P. Petitcolas 
(Editors)

With contributions of: Scott Craver, Jean-Luc Dugelay, Frank Hartung, Neil F. Johnson, Martin Kutter, Jong-Hyeon Lee, Stanley Lai, Fabrizio Marongiu-Buonaiuti, Adrian Perrig, Stéphane Roche.

Hardcover, approx. 220 pages. 
Artech House Books, 1999 
ISBN 1-58053-035-4 
(Available on Amazon.com)

 Chapter 1: Introduction to information hiding (Fabien A. P. Petitcolas) gives an introduction to the field of information hiding, thereby discussing the history of steganography and watermarking and possible applications to modern communication systems.
 Chapter 2: Principles of steganography (Stefan Katzenbeisser) introduces a model for steganographic communication (the ‘prisoners problem") and discusses various steganographic protocols (such as pure steganography, secret key steganography, public key steganography and supraliminal channels).
 Chapter 3: A survey of steganographic techniques (Neil F. Johnson and Stefan Katzenbeisser) discusses several information hiding methods useable for steganographic communication, among them substitution systems, hiding methods in two-colour images, transform domain techniques, statistical steganography, distortion and cover generation techniques.
 Chapter 4: Steganalysis (Neil F. Johnson) introduces the concepts of steganalysis – the task of detecting and possibly removing steganographic information. Included is also an analysis of common steganographic tools.
 Chapter 5: Introduction to watermarking techniques (Martin Kutter and Frank Hartung) introduces the requirements and design issues for watermarking software. The authors also present possible applications for watermarks and discuss methods for evaluating watermarking systems.
 Chapter 6: A survey of current watermarking techniques (Jean-Luc Dugelay and Stéphane Roche) presents several design principles for watermarking systems, among them the choice of host locations, psychovisual aspects, the choice of a workspace (DFT, DCT, wavelet), the format of the watermark bits (spread spectrum, low-frequency watermark design), the watermark insertion operator and optimizations of the watermark receiver.
 Chapter 7: Robustness of copyright marking systems (Scott Craver, Adrian Perrig and Fabien A. P. Petitcolas) discusses the crucial issue of watermark robustness to intentional attacks. The chapter includes a taxonomy of possible attacks against watermarking systems, among them protocol attacks like inversion, oracle attacks, limitations of WWW spiders and system architecture issues.
 Chapter 8: Fingerprinting (Jong-Hyeon Lee) discusses principles and applications of fingerprinting to the traitor tracing problem, among them statistical fingerprinting, asymmetric fingerprinting and anonymous fingerprinting.
 Chapter 9: Copyright on the Internet and watermarking (Stanley Lai and Fabrizio Marongiu Buonaiuti) finally discusses watermarking systems from a legal point of view and addresses various other aspects of copyright law on the Internet.



 

The information hidding Homepage
http://www.cl.cam.ac.uk/~fapp2/steganography/



StegoArchive
http://members.tripod.com/steganography/stego.html



Watermarking World
http://www.watermarkingworld.org/



Information Hidding Workshop
http://www.cert.org/IHW2001/



Privacy Guide: Steganography
http://www.all-nettools.com/privacy/stegano.htm

-EOF-



Copyright Kaspersky Labs México.
México 2002