Skip to main content
  • Book
  • © 2017

Digital Watermarking

Techniques and Trends

  • Highlights digital watermarking techniques based on their applications
  • Presents new and recent algorithms in digital watermarking for copyright protection
  • Discusses future trends in digital watermarking
  • Includes supplementary material: sn.pub/extras

Part of the book series: Springer Topics in Signal Processing (STSP, volume 11)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 chapters)

  1. Front Matter

    Pages i-xxv
  2. Preliminary on Watermarking Technology

    • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
    Pages 1-14
  3. Signal Watermarking

    1. Front Matter

      Pages 15-15
    2. Audio Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 17-38
    3. Speech Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 39-53
  4. Multimedia Watermarking

    1. Front Matter

      Pages 55-55
    2. Image Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 57-66
    3. Video Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 67-80
    4. Three-Dimensional (3D) Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 81-99
  5. Document Watermarking

    1. Front Matter

      Pages 101-101
    2. Natural Language Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 103-119
    3. Text Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 121-129
    4. Software Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 131-144
    5. Relational Database, XML, and Ontology Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 145-161
  6. Advance in Watermarking

    1. Front Matter

      Pages 163-163
    2. Network Stream Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 165-179
    3. Hardware IP Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 181-190
    4. Security Enhancement of Digital Watermarking

      • Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
      Pages 191-203

About this book

This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field.

Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

Reviews

“This book introduces many watermarking techniques, applied to a wide range of media, and discusses the tradeoffs between different techniques. … it will serve as a great introductory resource for anyone (both researchers and practitioners) who is a beginner in this field and wants to familiarize themselves with the available techniques. Each chapter has an extensive references section that can then be used as a guide for more in-depth study.” (Andrew Kalafut, Computing Reviews, January, 2017)

Authors and Affiliations

  • Cybersecurity Laboratory, Wireless Innovation and Security Research Unit , National Electronics and Computer Technology Center (NECTEC), Thailand, Thailand

    Mohammad Ali Nematollahi

  • Cybersecurity Laboratory, Wireless Innovation and Security Research Unit, National Electronics and Computer Technology Center (NECTEC), Thailand, Thailand

    Chalee Vorakulpipat

  • Universidad Autónoma de Zacatecas , Zacatecas, Mexico

    Hamurabi Gamboa Rosales

About the authors

Dr. Mohammad Ali Nematollahi was born in 1986 in Shiraz, Iran. He received his B.S. in computer engineering (software) from Yazd University, Iran in 2008. He completed his master's degree in computer engineering (software) at the Islamic Azad University (IAU), Dubai, UAE in 2011, where he was also a lecturer from 2010 to 2011. He holds a Ph.D in computer and embedded systems engineering from Universiti Putra Malaysia (UPM). He has published numerous articles in international journals. His research interests include digital signal processing, speaker recognition and digital watermarking.

Dr. Chalee Vorakulpipat received his B.Eng. in electronics engineering from King Mongkut’s Institute of Technology Ladkrabang in Thailand and his M.S. in information technology from Kasetsart University in Thailand. He was awarded a scholarship from the Royal Thai Government to pursue a doctoral study. He earned his PhD in information systems from the University of Salford, UK. He is currently a senior researcher and head of the Cybersecurity Laboratory at the National Electronics and Computer Technology Center of Thailand. He has been involved in several projects in information security, mobile device management, social networking sites, ubiquitous computing, context-aware computing, e-health and mobile application development. He has written over 30 refereed publications in these areas, which have appeared in conference proceedings and journals such as Computers & Security, Advanced Engineering Informatics, Automation in Construction, Knowledge Engineering Review, and ETRI Journal. He also serves on the National Information Security of Thailand subcommittee. He also works as a lecturer for information systems courses at several universities in Thailand. He holds information security professional certificates including CISSP, CISA and IRCA:ISMS Lead Auditor, and a project management professional certificate - PMP.

Dr. Hamurabi Gamboa Rosales received his bachelor’s degree in electronics and communications engineering from the Faculty of Engineering at the University of Guadalajara’s in 2000. From 2001 to 2003, he completed his master’s degree in electrical engineering, focusing on digital signal processing, at the University of Guanajuato. He completed his doctoral studies in the area of voice processing at the Technical University of Dresden, Germany in 2010. He currently works as a professor and researcher in the area of research digital signal processing at the Academic Unit of Electrical Engineering of the Autonomous University of Zacatecas, Mexico.

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access