Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 78.
... 276 9 Watermark Security 279 9.1 Security Requirements 279 9.1.1 Restricting Watermark Operations 280 9.1.2 Public and Private Watermarking 282 9.1.3 Categories of Attack 284 9.1.4 Assumptions about the Adversary. χ. CONTENTS.
... Attack 284 9.1.4 Assumptions about the Adversary 289 9.2 Watermark Security and Cryptography 292 9.2.1 The Analogy ... Attacks 302 9.3.1 Scrambling Attacks 302 9.3.2 Pathological Distortions 303 9.3.3 Copy Attacks 304 9.3.4 Ambiguity ...
... attack (see next section). Robust watermarking is discussed in Chapter 8. Security The security of a watermark ... attack. The relative importance of these attacks depends on the application. In fact, there are situations in which the ...
... attack. Unauthorized removal refers to attacks that prevent a Work's watermark from being detected. It is common to distinguish between two forms of unauthorized removal: elimination attacks and masking attacks. The distinction is ...
... attack occurs when an adversary is able to determine that a watermark is present, but is neither able to decipher a message nor distinguish between embedded messages. In general, passive attacks are of more concern in steganography than ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |