Handbook of image-based security techniques first edition agarwal - The ebook is available for insta

Page 1


Handbook of Image-based Security Techniques First Edition Agarwal

Visit to download the full and correct content document: https://textbookfull.com/product/handbook-of-image-based-security-techniques-first-e dition-agarwal/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

The Handbook of Medical Image Perception and Techniques

2nd Edition Ehsan Samei (Editor)

https://textbookfull.com/product/the-handbook-of-medical-imageperception-and-techniques-2nd-edition-ehsan-samei-editor/

The handbook of medical image perception and techniques

Second Edition Cambridge University Press.

https://textbookfull.com/product/the-handbook-of-medical-imageperception-and-techniques-second-edition-cambridge-universitypress/

Learning-based VANET Communication and Security Techniques Liang Xiao

https://textbookfull.com/product/learning-based-vanetcommunication-and-security-techniques-liang-xiao/

Handbook of Multimedia Information Security Techniques and Applications Amit Kumar Singh

https://textbookfull.com/product/handbook-of-multimediainformation-security-techniques-and-applications-amit-kumarsingh/

https://textbookfull.com/product/handbook-of-image-engineeringzhang/

Image Processing and Pattern Recognition Based on Parallel Shift Technology First Edition Bilan

https://textbookfull.com/product/image-processing-and-patternrecognition-based-on-parallel-shift-technology-first-editionbilan/

An Introduction to Real Analysis First Edition Agarwal

https://textbookfull.com/product/an-introduction-to-realanalysis-first-edition-agarwal/

Deep Learning Techniques for Biomedical and Health Informatics 1st Edition Basant Agarwal

https://textbookfull.com/product/deep-learning-techniques-forbiomedical-and-health-informatics-1st-edition-basant-agarwal/

Image operators image processing in Python First Edition Kinser

https://textbookfull.com/product/image-operators-imageprocessing-in-python-first-edition-kinser/

Handbook of Image-Based Security Techniques

Handbook of Image-Based Security Techniques

Shivendra Shivani
Suneeta Agarwal
Jasjit S. Suri

MATLAB ® is a trademark of The MathWorks, Inc. and is used with permission. The MathWorks does not warrant the accuracy of the text or exercises in this book. This book’s use or discussion of MATLAB ® software or related products does not constitute endorsement or sponsorship by The MathWorks of a particular pedagogical approach or particular use of the MATLAB ® software.

CRC Press

Taylor & Francis Group

6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

Version Date: 20180427

International Standard Book Number-13: 978-1-1-38-05421-9 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com

and the CRC Press Web site at http://www.crcpress.com

Tomybelovedfamilymembersforencouragingand admiringmetobelievethatIamcapableofauthoring abook.

Tomyhusbandforhisuntiringeffortandsupport.

SuneetaAgarwal

Toallmycollaboratorsaroundtheworld.

JasjitS.Suri

1.6.1ObservationsRelatedtoTheBasisMatrix

1.6.2EssentialConditionsforaBasisMatrix

viii Contents

1.7DIFFERENTEVALUATIONPARAMETERS

2.1VARIOUSDIMENSIONSOFVISUALCRYPTOGRAPHY 28

2.1.1TraditionalVisualCryptography(TVC) 29

2.1.1.1Thresholdvisualcryptography 30

2.1.2ExtendedVisualCryptography(EVC) 32

2.1.2.1Halftonevisualcryptography(HVC) 32

2.1.2.2Significanceofahalftoneimageovera binaryimage 33

2.1.2.3Halftoneimagecreationusingerror diffusion 33

2.1.2.4Taggedvisualcryptography(TVC) 37

2.1.2.5Friendlyvisualcryptography(FVC) 39

2.1.2.6Sizeinvariantvisualcryptography 39

2.1.2.7Progressivevisualcryptography(PVC) 42

2.1.2.8Progressivevisualcryptographywith meaningfulshareswithoutpixelexpansion 43

2.1.3DynamicVisualCryptography(DVC) 47

2.1.3.1Multitone/Continuoustonevisual cryptography(MVC) 47

2.1.3.2MVCwithunexpandedmeaningfulshares 49

2.1.3.3Perfectrecoveryofthesecretimagein MVC 50

2.1.3.4Visualcryptographywithmultiplesecretsormultisecretsharing(MSS) 51

2.1.3.5AnglerestrictionprobleminMSS 51

2.1.3.6Multisecretsharingwithunexpanded meaningfulshares 54

2.1.3.7XOR-basedvisualcryptography 54

2.1.3.8HybridapproachwithXOR-basedVC, multitoneVC,FVC,sizeinvariantVC andmultisecretsharing 56

2.1.3.9Verifiablevisualcryptography(VVC) 57

2.1.3.10HybridapproachwithVVC 60

2.1.3.11Randomgrid-basedvisualcryptography (RGVC) 60

2.1.3.12HybridapproachesusingRGVC 61

Chapter 3 VCApproacheswithComputationlessRecovery ofSecrets 65

3.1COMPUTATIONLESSANDCOMPUTATION-BASED VISUALCRYPTOGRAPHYAPPROACHES 66

3.2BASICSFORTHEDEVELOPMENTOFCOMPUTATIONLESSVCAPPROACHES 68

3.2.1DevelopmentofThresholdVisualCryptography 68

3.2.2DevelopmentofaHalftoneVisualCryptography (HVC)Scheme 74

3.2.3DevelopmentofaFriendlyVisualCryptography (FVC)Scheme 77

3.2.4DevelopmentofSizeInvariantVisual Cryptography 80

3.2.4.1Preprocessingofsecretimageforsize invariantvisualcryptography 80

3.2.4.2Sizeinvariantsharegenerationwiththe helpofthepreprocessedsecret 84

3.2.5DevelopmentofaHybridApproachUsing FriendlyVisualCryptography(FVC)andSize InvariantVisualCryptography 86

3.2.5.1Stepsformakingahybridapproach 86

3.2.6DevelopmentofRandomGrid-BasedVisual Cryptography 91

3.2.6.1Stepstogeneratesharesusingarandom grid 93

3.2.7DevelopmentofVisualCryptographywith MultipleSecrets 95

3.2.7.1Stepstogeneratesharesformultiple secrets 95

3.2.8DevelopmentofProgressiveVisual Cryptography(PVC) 100

x Contents

Chapter 4 VCApproacheswithComputation-Based RecoveryofSecrets 107

4.1COMPUTATIONLESSANDCOMPUTATION-BASED VISUALCRYPTOGRAPHYAPPROACHES 109

4.1.1Computation-basedVCvs.ShareAlignment Problem 109

4.2BASICSFORTHEDEVELOPMENTOFCOMPUTATIONBASEDVCAPPROACHES 111

4.2.1DevelopmentofXOR-BasedVisualCryptography 112

4.2.2BasisMatrixCreationfortheXOR-BasedVC Approach 112

4.2.3XOR-BasedVCwithUnexpandedMeaningful Shares 116

4.2.3.1StepstodevelopXOR-basedVCwith unexpandedmeaningfulshares 116

4.2.4DevelopmentofMultitoneVisualCryptography 117

4.2.4.1Stepstodevelopmultitonevisual cryptographywithrandomshares 119

4.2.4.2Stepstogeneratemeaningfulsharesfor amultitonesecret 122

4.2.5DevelopmentofXOR-BasedMultiSecret SharingApproachforMultitoneSecrets 123

4.2.5.1StepstodevelopXOR-basedmulti secretsharingapproachformultitone secretswithrandomshares 123

4.2.6XOR-BasedMSSwithUnexpandedMeaningful Shares 129

4.2.7DevelopmentofVerifiableVisualCryptography 129

4.2.7.1Providingverifiabilityintotheshares generatedbycomputationlessVC approaches 130

4.2.7.2Stepsforaddingverifiabilityintothe sharesgeneratedbycomputationlessVC approaches 130

4.2.7.3Addingverifiabilityintotheshares generatedbycomputation-basedVC approaches 134

4.2.7.4Stepsforprovidingverifiabilityinthe sharesgeneratedbycomputation-based VCapproaches 136

5.1.1SignificanceoftheWord“Watermark”

5.1.2ImportanceofWatermarking

5.2WATERMARKINGAPPLICATIONS

5.2.1ProofofOwnership

5.2.2OwnershipIdentification

5.2.3BroadcastMonitoring

5.2.4ContentAuthentication

5.2.5TamperRecovery

5.2.6TransactionTracking

5.2.7CopyControl

5.2.8DeviceControl

5.3CLASSIFICATIONOFWATERMARKINGTECHNIQUES

5.3.1BasedonVisibility

5.3.1.1Visiblewatermarking

5.3.1.2Invisible/hiddenwatermarking 157

5.3.2BasedonDegreeofResistancetoAttacks 157

5.3.2.1Robustwatermark 157

5.3.2.2Fragilewatermark 158

5.3.2.3Semi-fragilewatermark 158

5.3.2.4Dualwatermarking 159

5.3.3BasedonWatermarkEmbedding 159

5.3.3.1Block-basedwatermarking 159

5.3.3.2Pixel-basedwatermarking 160

5.3.4BasedonWatermarkDetection/Extraction 160

5.3.4.1Non-blind/Non-obliviouswatermarking 160

5.3.4.2Semi-blindwatermarking 161

5.3.4.3Blind/obliviouswatermarking 161

5.4PROPERTIESOFWATERMARKS 161

xii Contents

5.4.1Robustness

5.4.2Fragility

5.4.3Imperceptibility

5.4.4Capacity

5.4.5Security

5.4.6ComputationalCost

5.5ATTACKS

5.5.1TypesofAttacks

5.5.1.1Intentionalattack

5.5.1.2Unintentionalattack

5.5.2ExampleofAttacksintheWatermarkingSystem

5.5.2.1Removalattack

5.5.2.2Additionattack

5.5.2.3Cryptographicattacks

5.5.2.4Copypasteattack

5.5.2.5Printscanattack

5.5.2.6Geometricattack

5.6WATERMARKINGDOMAIN

5.6.1SpatialDomain

5.6.2FrequencyDomain

5.7MEASURESOFEVALUATION

5.7.1SubjectiveMeasures

5.7.2ObjectiveMeasures

5.7.3OtherEvaluationParameters

5.7.3.1Falseacceptancerate(FAR)

5.7.3.2Falserejectionrate(FRR)

5.8WATERMARKINGSCHEMEWITHRECOVERY CAPABILITIES 173

5.8.1RecoveryUsingSpatialDomain 173

5.8.2RecoveryUsingFrequencyDomain 174

Chapter 6 FragileWatermarking

6.1INTRODUCTION

6.1.1FragileWatermarkasaHashFunctionforImages

6.1.2FragilityofaFragileWatermark

6.1.3TypesofFragileWatermark 180

6.1.3.1Onthebasisoftheembeddingmechanism 181

6.1.3.2Onthebasisoftheextractionmechanism 182

6.2GENERATIONOFAFRAGILEWATERMARK 183

6.2.1Image-BasedFragileWatermark 183

6.2.1.1Relationbetweencoverimageand image-basedwatermark 184

6.2.2Self-EmbeddingTechniques 187

6.2.2.1Relationbetweencoverimageandselfembeddingwatermark 188

6.2.3ExampleofSelf-EmbeddingTechniques 189

6.2.4SignificanceoftheXOROperationin Self-Embedding 193

6.2.5FragileWatermarkwithSymmetricKey 194

6.2.6WatermarkGenerationforColorImages 195

6.3EMBEDDINGOFAFRAGILEWATERMARK 196

6.3.1DomainSelection 196

6.3.1.1Spatialdomain 196

6.3.1.2Frequencydomain 197

6.3.1.3Whichdomainissuitableforafragile watermark? 197

6.3.2BitPlaneSlicing 197

6.3.2.1Whichbitshouldbechosenfor embedding? 200

6.3.2.2Howmanybitsshouldbechosenfor embedding? 201

6.3.3Imperceptibilityvs.TamperDetection 204

6.3.3.1Block-basedembedding 204

6.3.3.2Pixel-basedembedding 205

6.3.3.3Region-of-interest(ROI)-based embedding 207

6.4EXTRACTIONOFAFRAGILEWATERMARK 209

6.4.1UnintentionalTampering 209

6.4.2IntentionalTampering 210

6.4.3Semi-FragileWatermarks 211

6.4.4TamperLocalization 212

6.4.4.1Tamperlocalizationfornon-blindfragile watermark 213

xiv Contents

6.4.4.2Tamperlocalizationforsemi-blind fragilewatermark 213

6.4.4.3Tamperlocalizationforblindfragile watermark 213

6.4.4.4Pixelwisetamperdetection 213

6.4.4.5Blockwisetamperdetection 214

6.4.5TamperDetectionParameters 214

Chapter 7 FragileWatermarkwithRecoveryCapabilitiesin SpatialDomain 219

7.1INTRODUCTION 221

7.1.1FragileWatermarkwithRecoveryCapabilities 221

7.1.2SummaryBitStream:RecoveryInformation 221

7.1.3SummaryandAuthenticationBitStreams 222

7.1.4FragilityofFragileWatermark 222

7.1.5TypesofFragileWatermarkwithRecovery Capabilities 223

7.1.5.1Onthebasisoftheembeddingmechanism 223

7.1.5.2Onthebasisoftheextractionmechanism 226

7.1.6IdealCategoryforFragileWatermarkwith RecoveryCapabilities 227

7.2GENERATIONOFAFRAGILEWATERMARK 228

7.2.1Self-EmbeddingTechniques 228

7.2.1.1Self-embeddingwithblock-based authenticationandblock-basedrecovery 229

7.2.1.2Self-embeddingwithpixel-based authenticationandblock-basedrecovery 234

7.2.1.3Self-embeddingwithpixel-based authenticationandpixel-basedrecovery 234

7.3EMBEDDINGOFFRAGILEWATERMARK 237

7.3.1EmbeddingandOriginatingBlocksareSame: 237

7.3.2OriginatingBlocksareEmbeddedinto SequentiallyMappedEmbeddingBlocks 237

7.3.3OriginatingBlocksareEmbeddedinto RandomlymappedEmbeddingBlocks 239

7.4EXTRACTIONOFAFRAGILEWATERMARK 240

7.4.1TamperLocalizationandRecovery 241

7.4.1.1Non-blindauthenticationandnon-blind recovery 241

7.4.1.2Semi-blindauthenticationandsemiblindrecovery 241

7.4.1.3Blindauthenticationandsemi-blind recovery 241

7.4.1.4Blindauthenticationandblindrecovery 242

7.4.1.5Block-basedtamperdetectionand recovery 242

7.4.1.6Pixel-basedtamperdetectionand block-basedrecovery 242

7.4.1.7Pixel-basedtamperdetectionandpixelbasedrecovery 244

7.4.2Non-ZeroFARDuetoImproperMapping 247

Chapter 8 FragileWatermarkwithRecoveryCapabilitiesin FrequencyDomain 249

8.1INTRODUCTION 250

8.1.1SummaryBitStream:RecoveryInformation throughFrequencyCoefficient 251

8.1.2TypesofFragileWatermarkwithRecoveryCapabilitiesinFrequencyDomain 251

8.1.2.1Onthebasisoftheembeddingmechanism 252

8.1.2.2Onthebasisoftheextractionmechanism 253

8.2GENERATIONOFAFRAGILEWATERMARK 253

8.2.1Self-EmbeddingTechniques 254

8.2.1.1Block-basedself-embeddingapproach 254

8.2.1.2Exampleofblock-basedsummarybit generation 256

8.2.1.3Non-block-basedself-embeddingapproach 260

8.2.1.4Exampleofsummarybitgenerationfor non-block-basedrecovery 260

8.3EMBEDDINGOFAFRAGILEWATERMARK 263

8.3.1EmbeddingofSummaryBitsinSpatialDomain 263

8.3.2EmbeddingofSummaryBitsinFrequency Domain 264

8.4EXTRACTIONOFAFRAGILEWATERMARK 265

8.4.1TamperLocalizationandRecovery 266

C

9.1INTRODUCTION

9.1.1RobustWatermarkforOwnershipAssertion

9.1.2RobustnessofRobustWatermark 272

9.1.3ImageasWatermark 272

9.1.4RelationshipbetweentheDimensionsofCover andWatermarkedImages 273

9.1.5ImageTypesforWatermark 274

9.1.6Singlevs.MultipleRobustWatermarks 274

9.1.7EncryptedRobustWatermark 275

9.1.8TypesofRobustWatermarkontheBasisof ExtractionMechanism 275

9.1.8.1Non-blindrobustwatermark 275

9.1.8.2Semi-blindrobustwatermark 276

9.1.8.3Blindrobustwatermark 276

9.2GENERATIONOFROBUSTWATERMARK 277

9.2.1BinaryVectorGenerationforBinaryImages 277

9.2.2BinaryVectorGenerationforGray/ColorImages 278

9.2.3EncryptionoftheBinaryVectorofWatermark 278

9.3EMBEDDINGOFROBUSTWATERMARKS 278

9.3.1DomainSelectionforEmbedding 278

9.3.2EmbeddingofRobustWatermarkinFrequency Domain 279

9.3.2.1DCT-basedembeddingforrobust watermarks 280

9.4EXTRACTIONOFROBUSTWATERMARKS 283

9.4.1EffectofUnintentionalTamperingona Watermark 285

9.4.2EffectofIntentionalTamperingonaWatermark 285

9.4.3ExtractionofMultipleWatermarks 285

9.4.4Extraction-BasedCategorizationofRobust Watermarking 288

9.4.4.1Ownershipassertionfornon-blind robustwatermarks 288

9.4.4.2Ownershipassertionforsemi-blind robustwatermark 288

9.4.4.3Ownershipassertionforblindrobust watermark 290

9.4.5DecryptionoftheEncryptedWatermarkBit Vector 290

9.4.6WatermarkComparisonParameters 290

9.4.6.1Objectiveevaluationparameters 290

9.4.6.2Subjectiveevaluationparameters 291 Chapter 10 DualWatermarking 293

10.1INTRODUCTION 294

10.1.1NeedforDualWatermark 295

10.1.2ManagingRobustnessandFragilityattheSame Time 295

10.1.3ImageforRobustWatermarkandSelf-Embedding forFragileWatermark 296

10.1.4AchievableSecurityRequirementsthroughDual Watermarking 297

10.1.5Semi-FragileWatermarksvs.DualWatermarks 297

10.1.6TypesofDualWatermarks 298

10.1.6.1Onthebasisoftheembeddingmechanism 298

10.1.6.2Onthebasisoftheextractionmechanism 301

10.2GENERATIONANDEMBEDDINGOFDUALWATERMARKS 302

10.2.1HierarchicalApproachforWatermarkGenerationandEmbedding 302

10.2.1.1Embeddingofthewatermark(selected ascopyright)inthefrequencydomain 303

10.2.1.2Fragilewatermarkgenerationusinga self-embeddingapproachfromthecopyrightembeddedimage 304

10.2.1.3Fragilewatermarkvector Fb embedding inthespatialdomainofthecopyright embeddedimage IRW 306

10.2.2ValidityoftheProposedDualWatermarkEmbeddingSequence 307

10.3EXTRACTIONOFDUALWATERMARKS 310

10.3.0.1Authenticationandauthorizationfor non-blinddualwatermark 314

xviii Contents

10.3.0.2Authenticationandauthorizationfor semi-blinddualwatermarks 314

10.3.0.3Authenticationandauthorizationfor blinddualwatermark 315

10.3.0.4Blockwisetamperdetection 315

10.3.0.5Pixelwisetamperdetection 315

10.3.1TamperRecoveryinDualWatermarking 315

10.3.2TamperDetectionandWatermarkComparison Parameters 319 S

11.3.1Fidelity

11.3.2EmbeddingCapacity

11.3.3EmbeddingEffectiveness

11.4PERFORMANCEMEASURESFORSTEGANOGRAPHY APPROACHES

11.4.2Imperceptibility

11.4.3FalsePositiveandFalseNegative

11.4.4ComputationCost

11.6.2ActiveSteganalysis

12.2.1PreprocessingaSecretMessage

12.2.1.1Losslesscompressionofsecretmessage

12.2.2.1Spatialdomain

12.2.2.2Frequencydomain

12.2.3SecretBitsEmbedding

12.2.3.1Embeddinginthespatialdomain

12.2.3.2Embeddinginthefrequencydomain

12.4.1Cachin’sDefinitionofSteganography

12.4.2LSB-BasedSteganalysis

Section IV HybridApproachesandAdvancedResearch Topics

13.2HYBRIDAPPROACHUSINGSTEGANOGRAPHYAND WATERMARKING 366

13.2.1CombinationofRobustWatermarkingand SteganographyApproach 366

13.2.1.1Stepstomakeahybridapproachusing robustwatermarkingandasteganographyapproach 369

13.2.1.2Effectofsteganographyonthewatermarkedimage 370

13.2.2CombinationofaFragileWatermarkingand Steganographyapproach 370

13.2.2.1Stepstomakeahybridapproachusing fragilewatermarkingandasteganographyapproach 372

13.2.3ValidSequenceforSteganographyand Watermarking 373

13.3HYBRIDAPPROACHUSINGVISUALCRYPTOGRAPHY ANDWATERMARKING 374

13.3.1CombinationofVCwithHalftoneSharesanda WatermarkingApproach 374

13.3.1.1Protectionofhalftonesharesusingfragilewatermarks 375

13.3.1.2Effectofafragilewatermarkonshares 375

13.3.2CombinationofVCwithmultitonesharesand watermarkingapproach 376

13.3.2.1Protectionofamultitoneshareswitha robustwatermarkingapproach 376

13.3.2.2Protectionofmultitoneshareswitha fragilewatermarkingapproach 378

13.4HYBRIDAPPROACHUSINGVISUALCRYPTOGRAPHY ANDSTEGANOGRAPHY 381

13.5HYBRIDAPPROACHUSINGVISUALCRYPTOGRAPHY, WATERMARKINGANDSTEGANOGRAPHY 382

13.5.1CombinationofHalftoneVCwithFragile WatermarksandSteganography 382

13.5.1.1Stepstoembedafragilewatermarkand steganographyintothehalftoneshare 382

13.5.2CombinationofMultitoneVCwithFragile Watermarks,RobustWatermarksand Steganography 384

Chapter 14 ProtectionofMultimediaObjectsUsing Image-BasedSecurityMethods

14.1INTRODUCTION

14.2AUDIO/SPEECHWATERMARKINGAND STEGANOGRAPHY

14.2.1Selectionofthewatermarkformat

14.2.2AudioRobustWatermarking

14.2.2.1Stepstoembedrobustaudiowatermarksorsteganographicmessages 393

14.2.3AudioFragileWatermarking

14.2.3.1Stepsforembeddingafragilewatermarksorsteganographymessages 394

14.3AUDIO/SPEECHSECRETSHARING

14.3.1StepstoCreateSharesofTheSpeechSignal

14.4VIDEOWATERMARKING,STEGANOGRAPHYAND SECRETSHARING

14.4.1BasicTerminologyforVideo

14.4.2ProcessforVideoSteganography/Watermarking

14.4.3EnhancingtheSecurityofVideo Watermarking/Steganography

14.5.1Introduction

14.5.2EmbeddingDomainin3DModels

14.5.2.1Geometricfeatures

14.5.2.2Topologicalfeatures

14.63DSTEGANOGRAPHYANDSECRETSHARING

Foreword

WiththerapidadvancementsintechnologyandthepopularityoftheInternet,illegalmodificationsindigitalmediahavebecomeeasyanddifficultto prevent.Thereforetheprotectionofdigitalmediaanditspropertyrightshave becomevitalissuesofconcern.Protectingdigitaldataisextremelyimportant andanemergingareaofresearch.Manyeffortshavebeenmadeinthisarea bythecryptographiccommunity.Imagesaretreatedasverypowerfuldigital mediawhichmustbeprotectedontheweb.Therearethreeimage-basedsecuritymechanismswhichreportedtillnowareVisualcryptography,Digital ImageWatermarkingandSteganography.Specifically,visualcryptographyallowseffectiveandefficientsecretsharingofimagesamonganumberoftrusted parties.Visualcryptographyprovidesaverypowerfultechniquebywhichone secretimagecanbedistributedintotwoormoreshares.Whentheshares, printedontotransparenciesaresuperimposedtogether,theoriginalsecretimagecanberecoveredwithoutanycomputation.Whiledigitalwatermarking andsteganographyseemverycloselyrelatedterms,theyareactuallyverydifferentinnatureandpractice.Watermarkingisusedtoprotecttheownership informationorcontentoftheoriginalcoverimagewithorwithouttamperrecoverycapabilitieswhereassteganographyisusedtoprotectanysecretimage ortextbehindtheimage.

Preface

Thisbookisespeciallywrittenforyoungresearcherswhowanttotaketheir researchdirectiontowardimage-basedsecuritytechniques.Thisbookiswrittenfromthebeginner’sperspectivewiththecommitmenttomakethemfully capableofunderstandingalllatestresearchgapsinthisfield.Ourgoalwith thisbookistoprovideaframeworkinwhichonecanconductresearchand developmentofimagebasedsecuritytechnology.Thisbookisnotintended asacomprehensivesurveyofthefieldofvisualcryptography,watermarking andsteganography.Rather,itrepresentsourownpointofviewandourown technicalcontributiononthesubject.Althoughweanalyzespecificexamples fromtheliterature,wedosoonlytotheextentthattheyhighlightparticular conceptsbeingdiscussed.

PURPOSE

Ourpurposewiththisbookistoprovideguidelinestoreaderswhichareused toenhancetheresearch-orientedconceptsofvisualcryptography,watermarkingandsteganography.Thisbookrepresentsgroundtruthaswellasourown perspectivesonthissubject.Somewell-knownexamplesaretakenfromthe literaturetohighlighttheparticularconcepts.Wearenoexception,ourown backgroundsbeingpredominantlyinimagesandsecurity.Thefundamental principlesbehindallthesecuritydimensionsofimagesaresame,sowehave madeanefforttokeepourdiscussionoftheseprinciplesgeneric.Thisbookis easilyaccessibletothosewhodonotknowmuchaboutimagesandsecurity fundamentals.Inonesentence,wecansaythatthisbookoffersencouragement andempowersreaderstorejuvenatetheirinnovativeimaginationsinthefield ofimage-basedsecurity.

CONTENTANDORGANIZATION

Thisbookisdividedintofoursections.Thefirstsectionincludes Chapters 1,2,3 and 4 whichdealswiththeconceptofvisualcryptographyfromthe basictoadvancedlevel.Theobjectiveofthissectionistomakeresearchers awareofthislatesttechnologyofsecretsharing.Eachchapterinthissection providesthefundamentalsforthevisualcryptographyunderconsideration andadetaileddescriptionoftherelevantmethods,presentingexamplesand practicalapplicationstodemonstratethefunctioningofvisualcryptography.

xxvi Preface

Chapter1 providesintroductorymaterialforvisualcryptography,preliminaries,variousevaluationparametersaswellasawidevarietyofapplications ofVCthatservesasmotivation.TheapplicationshighlightavarietyofsometimesconflictingrequirementsforVC,whicharediscussedinmoredetailin thesecondhalfofthechapter.

Chapter2 dealswiththebroadclassificationofVConthebasisofvarious applicationsandsubjectiveevaluationparameters.

Chapter3 perfectlydealswithallclassesofVClikeHalftoneVisual Cryptography(HVC),ProgressiveVisualCryptography(PVC)etcwhichare actuallymadeforhalftoneimagesasinputwhichrequirenocomputationat allattherecoveryend.

Attheendofthissection Chapter4 dealswithallclassesofVClikeMultitone VisualCryptography(MVC),XOR-basedVisualCryptography,MultiSecret Sharing(MSS)etcwhichareactuallymadeforperfectrecoveryandrequire computationattherecoveryend.

Afterreadingthissection,onewillbeabletothinkabouttheresearch gapsinthefieldofVCandbeabletocustomizetheexistingresearch.

Thesecondsectionincludes Chapters5,6,78,9 and 10 whichdealswith theconceptofDigitalImageWatermarkingfromthebasictoadvancedlevel. Afterreadingthissection,onewillbeabletojudgethebetterwatermarkingalgorithms,abletodevelophisownalgorithmandcustomizeallexisting algorithmsinanefficientmannersothattheygivemoreeffectiveresults.

Chapter5 providesintroductorymaterialonwatermarking.Itprovides ahistoryofwatermarking,aswellasawidevarietyofapplicationsofdigital watermarkingthatservesasmotivation.Theapplicationshighlightavariety ofsometimesconflictingrequirementsforwatermarking,whicharediscussed inmoredetailinthesecondhalfofthechapter.Thischapteralsopresents severalframeworksformodelingwatermarkingsystems.Alongtheway,we describe,test,andanalysesomesimpleimagewatermarkingalgorithmsthat illustratetheconceptsbeingdiscussed.Thischapteranalyzesmessageerrors, falsepositives,andfalsenegativesthatmayoccurinwatermarkingsystems duringtheevaluationofwatermarkingtechniques.

Chapter6 dealswithoneofthemostimportantclassesofwatermarking whichisgenerallyusedincontentauthentication.Herewedealwithvarious state-of-artapproachesforblock-basedandpixel-basedfragilewatermarking techniquesintheenvironmentofvariousintentionalandunintentionalattacks. Herewealsodealwiththerecoverytechniquesoftheremovalfortheimage content.

Chapter7 dealswithmorepowerfulfragilewatermarkingtechniqueshavingthecapabilitiesoftamperdetectionaswellasrecoverywithoutinterventionintheoriginalcontent.Thisfacilityisprovidedinthespatialdomainof theimage.

Chapter8 dealswithmorepowerfulfragilewatermarkingtechniqueshavingthecapabilitiesoftamperdetectionaswellasrecoverywithoutinterven-

Preface xxvii tionintheoriginalcontent.Thisfacilityisprovidedinthefrequencydomain oftheimage.

Chapter9 dealswithoneofthemostimportantclassesofwatermarking whichisgenerallyusedincopyrightprotection.Herewedealwithvarious state-of-artapproachesforrobustwatermarkingandtheirbehaviourinthe presenceofnoisyenvironments.

Chapter10 providesanefficientapproachtowardthemakingofaspecial kindofwatermarkhavingthequalitiesofbeingbothafragileaswellasrobust watermark.

Thethirdsectionincludes Chapter11 and Chapter12 whichdealwiththe conceptofsteganographyandsteganalysis.Herewedealwiththenotion,terminologyandbuildingblocksofsteganographiccommunication.In Chapter 11 wedealwiththebasicterminologiesandunderstandingofsteganography whereas Chapter12 providessomepracticalapproachtowardssteganographyandsteganalysis.Thefourthsectioncontainssomewhatadvancedresearch topicsinthisfield.Thissectioncontainstwochapters: Chapters13 and 14 Here Chapter13 dealswithalltypesofhybridapproachesmadebytwoor moreimage-basedsecuritytechniquesand Chapter14 dealswithprotection ofothermultimediaobjectslikevideo,audio,etc.

AUDIENCE

Primary: Thisisacompletetextbookonimage-basedsecuritywhichdeals withallthreesecuritydimensionsofimages.Duetoitsexcellentintroductory contentandmotivationsintheformofvariousapplications,thisbookmaybe treatedasastartupbook.Hencethiswillhelpallthosenovicereaderswho wanttostarttheirresearchinthefieldofimagebasedsecurity.

Secondary: Findingnovelproblemsismoredifficultthanfindingtheirsolutions.Forthesamereason,thisbookalsodealswithallpotentialresearch gapswhichmaybetreatedasafuturescopeofresearchinthefieldofimage basedsecurity.Hencethisbookisagainmostappropriateforthoseresearchers whoarealreadyinvolvedinthisfieldbuttrappedsomewherebecausetheydo nothaveproperproblemstatements.

UNIQUEANGLES

Inthisbook,theauthors:

1.Presenttheimplementationofeachconceptusedinthisbookin MATLAB asawhole.

2.PresentthestepwisefunctionsofMATLAB whereverrequiredinbetweenthetext,sothatthereadercanunderstandthetheoreticaland practicalconceptsofimage-basedsecuritysimultaneously.

3.Presentmanyencouragingreal-lifeexamplesandapplicationswhichwill definitelymotivatetheusers.

xxviii Preface

READERBENEFITS

1.Novicereaderswillenhancetheirbasicunderstandingofsecurityand images.

2.Readerswilllearnhowtostartthinkinginresearchdirectionsonimagebasedsecurity.

3.Researcherswillseenewdomainsforresearch.

4.Readerswillbeabletoimplementtheconceptofsecurityonimages usingMATLAB

5.Readerswillalsobeabletodevelopnovelreal-lifeapplicationswhere imagesareusedforauthenticationinvariousways.

6.Allchaptersofasectionarewellconnected.Areadercanstartany sectionbecausethesectionsarenotdependentoneachother.

ACKNOWLEDGEMENTS

Myfirstdebtofgratitudemustgotomyadvisor,Prof.SuneetaAgarwal. Icouldnothaveimaginedhavingabetteradvisorandmentorinmylife. WhateverIsayofherinthisacknowledgementisnotenoughtodescribeher knowledgeandskill.Shepatientlyprovidedmethevision,encouragementand advisethroughoutthewritingofthisbook.

Iamalsogratefultoallmembersofmybuddygroup(ShailendraTiwari, AshutoshAgarwal,RamanSingh,NitinSaxena,VipinPalandVinayGautam)withwhomIwasabletoholdqualitativediscussionsandforpushing mehardinmyfreetimetowritethisbook.Intheend,Iamverythankful tomyparents,Bhaiya,Bhabhi,Didi,Jija,youngerbrothers&sistersandmy fianceewhodreamedofthistimeandinstilledinmewithdreamsofresearch anditswonders,andwatchedwithaffectionmyjourneytowardstheirdream andmygoal.

MATLAB isaregisteredtrademarkofTheMathWorks,Inc.Forproductinformationpleasecontact:

TheMathWork,Inc. 3AppleHillDrive Natick,MA,01760-2098USA

Tel:508-647-7000

Fax:508-647-7001

E-mail: info@mathworks.com

Web: www.mathworks.com

ShivendraShivaniSuneetaAgarwalJasjitS.Suri

Another random document with no related content on Scribd:

The Project Gutenberg eBook of Les cent

histoires de Troye

This ebook is for the use of anyone anywhere in the United States and most other parts of the world at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this ebook or online at www.gutenberg.org. If you are not located in the United States, you will have to check the laws of the country where you are located before using this eBook.

Title: Les cent histoires de Troye L'epistre de Othea deesse de prudence envoyee a l'esperit chevalereux Hector de Troye avec cent hystoires

Author: de Pisan Christine

Release date: January 6, 2024 [eBook #72643]

Language: French

Original publication: Paris: unknown, 1500

Credits: Laurent Vogel and the Online Distributed Proofreading Team at https://www.pgdp.net (This file was produced from images generously made available by the Bibliothèque nationale de France (BnF/Gallica)) *** START OF THE PROJECT GUTENBERG EBOOK LES CENT HISTOIRES DE TROYE ***

Les cent histoires de troye.

PHILIPPE PIGOUCHET

L’epistre de Othea deesse de prudence envoyee a l’esperit chevalereux Hector de troye/ avec cent hystoires. Nouvellement imprimee a Paris.

Treshaulte fleur par le monde louee.

A tous plaisant/ & de dieu advouee

De lis souef odorant delectable

Puissant valeur hault pris sur tous notable

Louenge a dieu avant oeuvre soit mise

Et puis a vous noble fleur qui transmise

Fustes du ciel pour anoblir le monde

Seigneurie tresdroituriere et monde

D’estoc troyen ancienne noblesse

Pillier de foy que nul erreur ne blesse

Que hault renom nul lieu ne va celant

A vous aussi noble prince excellent

D’orleans duc Loys de grant renom

Filz de charles roy quint d’iceluy nom

Qui fors le roy ne congnoissons greigneur

Mon tresloué et redoubté seigneur

D’humble vouloir moy povre creature

Femme ignorant de petite estature

Fille jadis philozophe et docteur

Qui conseillier et humble serviteur

Vostre pere/ que dieu face sa grace

Et jadis vint de boulongne la grasse

Dont il fut né par le sien mandement

Maistre thomas de pizan/ autrement

De boulongne fut dit et surnommé

Qui solennel clerc estoit renommé

En desirant faire se je sçavoye

Chose plaisant qui vous mist en voye

D’aucun plaisir ce me seroit grant gloire

Pour ce emprins ay d’indigne memoire

Presentement ceste oeuvre a rimoyer

Mon redoubté/ pour le vous envoyer

Le premier jour que l’an se renouvelle

Car moult en est la matiere nouvelle

Combien que soit de rude entendement

Pourpensee/ car je n’ay nul sentement

En sens fondé/ n’en ce cas ne ressemble

Mon bon pere/ fors ainsi comme on emble

Espis de blé en glennant en moissons

Parmy les champs/ et coste les buissons

Ou miettes cheans de haultes tables

Qu’on recueult quant les mets sont notables

Aultre chose n’en ay je recueilli

De son grant sens dont il a assez cueilly

Si ne vueillez mespriser mon ouvrage

Mon redoubté seigneur humain & sage

Pour le despoir de ignorant personne

Car petite clochette grant voix sonne

Qui bien souvent les plussaiges reveille

Et le labeur d’estude leur conseille

Pource prince treslouable & benigne

Moy nommee chrestienne femme indigne

De sens acquis pour si faicte euvre emprendre

A rimoyer et dire me vueil prendre

Une epistre qui a hector de troie

Fut envoiee sicomme l’histore l’ottroie

Se tel ne fut bien peut estre semblable

Ou ens a maint vers bel et notable

Bel a ouyr/ et meilleur a entendre

Doresenavant au commencer vueil tendre.

Or me doint dieu a sa louenge faire

Tous faitz et ditz & chose qui puist plaire

A vous mon redoubté/ pour qui l’emprens

Et humblement supplie se je mesprens

La franchise de vostre grant noblesse

Qu’elle me pardoint se trop grant hardiesse

D’escripre a vous personne si tresdigne

Entreprens moy en sagesse non digne.

Texte.

Cy commence l’epistre que othea la deesse envoya a Hector de troye quant il estoit en l’aage de quinze ans.

Othea deesse de prudence

Qui adresse les bons cueurs en vaillance

A toy hector noble prince puissant

Q i d fl i t

Qui en armes es adez flourissant

Filz de mars le dieu de bataille

Qui les faitz d’armes/ livre & taille

Et de minerve la deesse

Puissant/ qui d’armes est maistresse

Successeurs des nobles troyens

Hoir de troye et des cytoyens

Salutacion devant mise

Avec vraye amour sans faintise.

Et com je soye desirant

Ton grant preu que je voys querant

Et qu’augmentee & preservee

Soit/ et en tout temps observee

Ta vaillance et haulte proesse

Adez en ta prime jeunesse

Par mon epistre amonnester

Te vueil/ et dire & ennorter

Les choses qui sont necessaires

A haulte vaillance et contraires

A l’opposite de prouesse

Affin que ton bon cueur s’adresse

A acquerir par bonne escolle

Le cheval qui par l’air s’en volle

C’est pesagus le renommé

Qui de tous vaillans est aymé

Pour ce que ta condicion

Sçay par droicte inclinacion

Sçay par droicte inclinacion.

Aux faictz chevalereux abille

Plus que non aultres cinq cens mille

Et comme deesse je sçay

Par science non par essay

Les choses qui sont a avenir

Me doibt il de toy souvenir

Car je sçay qu’a tousjours seras

Le plus preux des preux & auras

Sur tous les aultres renommee

Mais que de toy je soye aymee

Aymee/ et pour quoy ne seroye

Je suy celle qui tous arroye

Ceulx qui m’ayment et tiennent chiere

Je leur lis leçon en chaiere

Qui les fait monter jusque au cieulx

Si te prie que soyes de ceulx

Et que tu me vueilles bien croire

Or met donc bien en ta memoire

Les ditz que je te vueil escripre

Et se tu m’os compter ou dire

Chose qui soit a avenir

Et je te dis que souvenir

T’en doibt com s’ilz fussent passees

Saches qu’ilz sont en mes pensees

En esperit de prophecie

Or enten et ne te soucye

Car riens ne diray qui n’avienne

S’avenu n’est/ or t’en souviengne. i. Glose.

Othea selon grec peult estre prins pour sagesse de femme. Et comme les anciens non ayans encore lumiere de foy adorassent plusieurs dieux. Soubz laquelle loy soient passees les plus haultes seigneuries qui au monde ayent esté comme le royaulme d’assirie/ de perse/ les gregoys/ les troyens/ Alixandre/ les rommains et maintz aultres. Et mesmement tous les plus grans philozophes. Comme dieu n’eust encore ouverte la porte de sa misericorde. A present nous chrestiens par la grace de dieu enluminez de vraie foy pouons ramener a moralité les opinions des anciens. Et sur ce maintes allegories pevent estre faictes. Et comme iceulx eussent acoustumé de toutes choses adorer/ qui oultre le commun cours des choses eussent prerogatives d’aulcune grace plusieurs dames sages qui furent en leurs temps appellees deesses. Et fut vraye chose selon l’histoire que au temps que troie la grant florissoit en sa haulte renommee une moult sage dame Othea appellee considerant la belle jeunesse de hector de troye qui ja florissoit en vertus qui pouoient estre demonstrance des graces estre en luy au temps advenir/ luy envoya plusieurs dons beaulx & notables. Et mesmement le beau destrier que on appelloit galathee qui n’eut pareil au monde. Et pour ce que toutes graces mondaines que bon chevalier doit avoir furent en hector pouons dire moralement que il les print par le admonestement othea qui cest epistre luy manda. par othea nous prendrons la vertu de prudence et sagesse dont luymesmes fut aorné. Et comme les quatre vertus cardinalles soient necessaires a bonne pollice nous en parlerons ensuivant. Et a cest premier avons donné nom & prins maniere de parler aulcunement poeticque & accordant a la vraie hystoire pour mieulx ensuivir nostre matiere. Et a nostre propos prendrons aulcunes auctoritez des philozophes anciens. Ainsi dirons que par la dicte dame fut baillé ou

envoyé ce present au bon hector qui semblablement peult estre a tous aultres desirans bonté & sagesse. Et comme la vertu de prudence soit tres a recommander dist le prince des philozophes Aristote pour ce que sapience est la plus noble de toutes aultres choses doibt elle estre monstree par la meilleur raison et la plus convenable maniere.

Prologue a alegorie.

Pour ramener a allegorie le propos de nostre matiere applicquerons la saincte escripture a noz ditz a l’edification de l’ame estant en cestuy miserable monde.

Comme par la souveraine sapience et haulte puissance de dieu toutes choses soyent crees raisonnablement doibvent toutes tendre a fin de luy. Et pource que nostre esperit de dieu creé a son ymage est des choses crees la plus noble apres les angelz. Convenable chose est & necessaire que il soit adorné de vertus parquoy il puisse estre convoyé a la fin pourquoy il est. Et pour ce que il peult estre empesché par les assaulx & agaz de l’ennemy d’enfer qui est son mortel adversaire & souvent le destourne de venir a sa beatitude. Nous pouons appeller la vie humaine droicte chevalerie comme dit l’escripture en plusieurs pars. Et comme toutes choses terrestres soient faillables devons avoir en continuelle memoire le temps futur qui est sans fin Et pource que ce est la somme & parfaicte chevalerie & toute autre soit de nulle comparaison. Et dont les victorieux sont couronnez en gloire prendrons maniere de parler de l’esperit chevalereux. Et ce soit faict a la louenge de dieu principalement & au proffit de ceulx qui se delicteront a ouyr ce present dictier.

Alegorie.

Comme prudence & sagesse soit mere & conduiseresse de toutes vertus sans laquelle ne pourroient estre bien gouvernees est il necessaire a l’esperit chevalereux que de prudence soit adorné

comme dit sainct augustin au livre de la singularité des clercz que en quelque lieu que prudence soit legierement peult on cesser et anientir toutes choses contraires Mais la ou prudence est despitee toutes choses contraires ont seigneurie. Et a ce propos dit Salomon en ses proverbes.

Si intraverit sapientia cor tuum et scientia anime tue placuerit consilium custodiet te et prudentia servabit te. Proverbiorum secundo capitulo.

Et a celle fin que tu saches

Qu’il te fault faire/ & que tu faces

A toy les vertus plus propices

Pour mieulx parvenir aux premisses

De vaillance chevalereuse

ii. Texte.

Et tout soit elle aventureuse

Encor te diray qui me maine

J’ay une mienne seur germaine

Remplie de toute beaulté

Mais sur toute especiaulté

Est doulce/ coye/ & attrempee

Ne jamais d’ire/ n’est frappee

A riens fors mesure ne pense

C’est la deesse d’attrempance

Si ne peulx s’a par elle nom

Avoir de grant grace le nom

Car s’elle n’en faisoit le pois

Tout ne te vauldroit pas sept pois.

Pour ce vueil qu’avec moy t’amye

Celle soit/ ne l’oublies mye

C’est la deesse tres apprise

Qui sage est/ moult l’ayme & prise.

ii. Glose.

Dit othea que attrempance est sa seur/ laquelle il doibt aymer. La vertu d’attrempance vrayement peult estre dicte seur et est semblable a prudence. Car attrempance est demonstrance de prudence/ & de prudence s’ensuyt attrempance. Pour ce dit que il la tienne pour s’amie. ce que semblablement doibvent faire tous bons chevaliers desirans le louyer donné aux bons. Si comme dit le philozophe nommé democritus.

Attrempance amodere les vices/ et parfait les vertus

ii Alegorie

La vertu d’attrempance qui a proprieté de limiter les superfluitez doit avoir le bon esperit. Et dit sainct augustin au livre des meurs de l’eglise que l’office de attrempance est refraindre & appaiser les meurs de concupiscence qui nous sont contraires & qui nous destournent de la loy de dieu. Et aussi despiter delices charnelles & louenge mondaine. A ce propos parle sainct pierre l’apostre en sa premiere epistre.

Obsecro vos tanquam advenas et peregrinos abstinere vos a carnalibus desideriis que militant adversus animam. Prima petri secundo capitulo

Et avec nous te convient force

Se tu de grand vertu fais force

Vers Hercules te fault virer

Et ses vaillances remirer

En qui il eut trop de bernage

iii. Texte

Et pour tant se a ton lignage

Fut contraire/ & eut attaine

N’ayes mye pour tant hayne

A ses vertus nobles & fortes

Qui de prouesse oeuvrent les portes

Mais se tu les veulx ensuyvir

Ja pour ses vaillances suyvir

Ne t’est pour tant necessaire

Aux infernaulx guerre faire

N’au dieu pluto aller contendre

Pour proserpine a avoir tendre

La fille ceres la deesse

Qu’il ravit sur la mer de gresse

Ne il ne t’est mye mestier

Que a cerberus le portier

D’enfer tu coppes les chaines

Ne a ceulx d’enfer prendre ataines

Qui trop sont desloyaux gaignons

Comme il fist pour ses compaignons

Pirotheus & theseus

Qui a pou furent deceups

D’eulx embatre en celle valee

Ou mainte ame est moult adoulee

Assez trouveras guerre en terre

Sans que l’ailles en enfer querre.

Si ne t’est mye necessaire

P h & f i

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.