Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Digital watermarking : techniques and trends
Nematollahi M., Vorakulpipat C., Rosales H., Springer International Publishing, New York, NY, 2016. 203 pp. Type: Book
Date Reviewed: Jan 18 2017

Digital watermarking has many applications, including steganography, data authentication, and digital rights management. It is a challenging problem, since the techniques used are dependent on the type of media being watermarked, and the many competing concerns, such as not significantly degrading the quality of the original document, tamper resistance, and accuracy of detecting the presence of the watermark.

This book introduces many watermarking techniques, applied to a wide range of media, and discusses the tradeoffs between different techniques. Each chapter presents the techniques that are used in a certain type of media (such as audio, images, video, text, database, and so on). Most chapters begin with a discussion of the media type, focusing on aspects of the media type that can affect watermarking. For example, the chapter on video explains the different frame types used in mpeg video. Then, various watermarking techniques for the media type are discussed, with a few paragraphs devoted to each technique. Attacks on the techniques are then presented, and then in most chapters, a discussion focusing on a comparison of the techniques concludes.

This book unfortunately has some notable flaws, including some noticeable grammatical problems, especially in the introduction, that at times distract the reader from the point of the text. While there are enough of these issues to be distracting, the book is still very readable.

Because the book does not provide much detail on each technique, it is questionable whether someone well versed in the field would gain much from the book. However, it will serve as a great introductory resource for anyone (both researchers and practitioners) who is a beginner in this field and wants to familiarize themselves with the available techniques. Each chapter has an extensive references section that can then be used as a guide for more in-depth study.

Reviewer:  Andrew Kalafut Review #: CR145002 (1704-0229)
Bookmark and Share
 
Security and Protection (K.6.5 )
 
 
Signal Analysis, Synthesis, And Processing (H.5.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy