Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

B O O K R E V I E W S

played and tabulating royalties due; owner commercial experience associated with
Digital Watermarking identification, e.g., finding the owner of a their roles in the ‘‘Galaxy’’ DVD water-
I. Cox, M. Miller, and J. Bloom. 576 pp. professional photograph to obtain a li- marking proposal supported by Hitachi,
ISBN 1-55860-714-5. Morgan Kaufmann cense; proof of ownership; content authen- IBM, NEC, Pioneer and Sony.
Publishers 共2001兲, $69.95 hardbound. tication, e.g., ensuring that a transmitted Chapter 7 motivates the usage of percep-
digital x-ray has not been tampered with; tual models in digital watermarking. Most
Reviewed by Chris Honsinger, Eastman and copy control, e.g., stopping a copier readers of this journal are likely intimately
Kodak Research Labs, Rochester, NY. when detecting copyrighted material. familiar with the perception-oriented con-
Digital watermarking technology has Chapter 3 focuses on the basics of em- cepts presented here. However, when the
loudly proclaimed its arrival over the past bedding and extracting watermarks prima- perceptual model affects the performance
several years. It is difficult to find any jour- rily from the point of view of elementary of the extraction, thus forming tradeoffs,
nal associated with signals, imaging, communications theory. This is comple- we are likely to be less familiar with the
sound, or video that doesn’t have a handful mented by an interpretation of digital wa- issues. The value of this chapter lies less in
of digital watermarking related articles. termarking that is based in geometry, e.g., its disclosure of the perceptual models but
Having worked in this field for several correlation is modeled as a dot product of more in the treatment of the interaction of
years now, I know that there is still quite a two vectors. This may prove helpful for the extraction process with perceptual
bit of confusion among users and policy students without a background in signal models.
makers about what this technology can and processing or communications concepts. Chapter 8 provides an overview of the
can’t do. Because the field is rather new, The chapter concludes by defining the elements of robust watermarking systems.
confusion is present even among the re- various ways to measure correlation. A robust image watermarking system can
searchers. Signs of this confusion are mul- While Chap. 3 somewhat generally con- survive ‘‘attacks’’ such as lossy compres-
tiple meanings for technical terms and siders the combination of watermarks with sion, cropping, rotation, scale, printing,
rampant re-invention of basic algorithms. images or sound, Chap. 4 presents ways of scanning, etc. This chapter provides a rea-
In my opinion, Digital Watermarking is mapping data into watermarks. The au- sonably complete overview of the tech-
the first book to succeed in bringing order thors again motivate concepts from mul- niques used to maintain the integrity of the
to this unsettled technology field. In gen- tiple points of view. Consequently, the watermark data in the face of these kinds
eral, the book presents a cohesive structure reader should gain a good deal of intuition of attacks.
to the vocabulary, conventions, and tax- for understanding the tradeoffs associated Chapter 9 explores another question that
onomy of the component technologies in- with the amount of data embedded and plays in both robust and fragile watermark-
volved in this field. It should be useful to digital watermarking systems design. ing systems. That is, what is the water-
upper level undergraduates with some Some consideration is also given to error marking systems’ ability to survive pur-
background in signal processing or com- detection and correction algorithms, an poseful attacks. In addition to discussing
munication theory, graduate students, and area that deserves special consideration in this topic from a general point of view, the
seasoned researchers in the field. Often the digital watermarking. authors explicitly describe seven known
authors present concepts from multiple Chapter 5 introduces the idea of in- attacks in detail.
points of view, making the concepts acces- formed embedding and informed coding. The last chapter considers the topic of
sible to professionals and students from The term informed implies that the media, content authentication. Content authentica-
differing disciplines. Many concrete ex- e.g., images or sound, are known at the tion is becoming increasingly relevant to
amples with ample discussions are pro- time of embedding. A counter-intuitive re- managing medical records, insurance com-
vided along with a source code support li- sult from information theory suggests that panies, forensic scientists, and military
brary. Because the authors have succeeded data can be embedded with media in such communications. The authors discuss how
on pedagogical, theoretical, and practical a way that the extraction is unencumbered digital-watermarking algorithms can deter-
grounds, the book will likely be the stan- by the media itself so long as the media is mine local or global media alterations,
dard textbook on this subject for quite known at the time of embedding 共and cer- whether the alteration is significant or in-
some time. tain other assumptions兲. Even though the significant, and under what conditions a
The first section in the book provides a assumptions are rarely, if ever, met, the digital watermark can be completely re-
historical perspective and motivates a concepts involved can be used to improve moved, restoring the media to its original,
number of useful applications of the tech- the data capacity of a digital watermarking unaltered state.
nology. The authors conclude this discus- system. This chapter explores specific In summary, this book contains a thor-
sion with a clarification of the use of digi- ways of doing this. ough treatment of digital watermarking
tal watermarking vis-à-vis cryptography. Chapter 6 provides an excellent ground- theory and practice. As a further measure
Chapter 2 delves deeper into the applica- ing in calculating error rates and false of completeness, the authors have lucidly
tions that can be addressed by digital wa- positive rates. For a digital watermarking distilled key theoretical results into an ap-
termarking and provides criteria for evalu- system to be accepted as a means for evi- pendix. For those not schooled in informa-
ating a given watermarking system for dence in the courts, a thorough character- tion theory or cryptography, a short primer
various applications. Among the applica- ization of the algorithm’s performance in is also included. Finally, the comprehen-
tions described are: broadcast monitoring, the context of these ideas is required. Here, sive reference section alone is worth the
e.g., monitoring radio stations for songs it is apparent that the authors bring their price of the book.

414 / Journal of Electronic Imaging / July 2002 / Vol. 11(3)


Downloaded From: https://www.spiedigitallibrary.org/journals/Journal-of-Electronic-Imaging on 11 Feb 2023
Terms of Use: https://www.spiedigitallibrary.org/terms-of-use

You might also like