Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 81.
... Authentication 20 2.1.6 Copy Control 22 2.1.7 Device Control 25 2.2 Properties 26 2.2.1 Embedding Effectiveness 27 2.2.2 Fidelity 27 2.2.3 Data Payload 28 2.2.4 Blind or Informed Detection 29 2.2.5 False Positive Rate 29 2.2.6 ...
... Authentication 319 10.1 Exact Authentication 321 10.1.1 Fragile Watermarks 321 10.1.2 Embedded Signatures 322 10.1.3 Erasable Watermarks 323 10.2 Selective Authentication 330 10.2.1 Legitimate versus Illegitimate Distortions 331 10.2.2 ...
... authentication (Chapter 10) was shaped by a conversation with Dr. Richard Green of the Metropolitan Police Service, Scotland Yard. We also thank M. Gwenael Doerr for his review. Special thanks, too, to Valerie Tucci, our librarian at ...
... Authentication: . . . . . . . . . . . . This . . . . . . system . . . . . . . illustrates . . . . . . . . . . a . . method . . . . . . 347 of authenticating images with pixel-by-pixel localization. That is, the detector determines ...
... authentication (with direct analogy to our $20 bill example), copy control, and device control. These applications are discussed in the next chapter. 2 Applications and Properties W atermarking can be used in. 10. CHAPTER ONE: INTRODUCTION.
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |