编者IngemarJ.CoxMatthewL.MillerJeffreyA.BloomJessicaFridrichTonKalker目录ContentsPrefacetotheFirstEditionxvPrefacetotheSecondEditionxixExampleWatermarkingSystemsxxiCHAPTER1Introduction11.1InformationHiding,Steganography,andWatermarking41.2HistoryofWatermarking61.3HistoryofSteganography91.4ImportanceofDigitalWatermarking111.5ImportanceofSteganography12CHAPTER2ApplicationsandProperties152.1ApplicationsofWatermarking162.1.1BroadcastMonitoring162.1.2OwnerIdentification192.1.3ProofofOwnership212.1.4TransactionTracking232.1.5ContentAuthentication252.1.6CopyControl.272.1.7DeviceControl312.1.8LegacyEnhancement322.2ApplicationsofSteganography342.2.1SteganographyforDissidents342.2.2SteganographyforCriminals352.3PropertiesofWatermarkingSystems362.3.1EmbeddingEffectiveness372.3.2Fidelity372.3.3DataPayload382.3.4BlindorInformedDetection392.3.5FalsePositiveRate392.3.6Robustness402.3.7Security412.3.8CipherandWatermarkKeys432.3.9ModificationandMultipleWatermarks452.3.10Cost462.4EvaluatingWatermarkingSystems462.4.1TheNotionof“Best”472.4.2Benchmarking472.4.3ScopeofTesting482.5PropertiesofSteganographicandSteganalysisSystems492.5.1EmbeddingEffectiveness492.5.2Fidelity502.5.3SteganographicCapacity,EmbeddingCapacity,EmbeddingEfficiency,andDataPayload502.5.4BlindorInformedExtraction512.5.5BlindorTargetedSteganalysis512.5.6StatisticalUndetectability522.5.7FalseAlarmRate532.5.8Robustness532.5.9Security542.5.10StegoKey542.6EvaluatingandTestingSteganographicSystems552.7Summary56CHAPTER3ModelsofWatermarking613.1Notation623.2Communications633.2.1ComponentsofCommunicationsSystems633.2.2ClassesofTransmissionChannels643.2.3SecureTransmission653.3Communication-Base
1