Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 85.
... models in watermarking systems. Although simple perceptual models for audio and still images are described, perceptual modeling is not the focus of this chapter. Rather, we focus on how any perceptual model can be used. xvi. PREFACE.
... described. The watermark embedders and watermark detectors that make up these systems are given names and are ... described in detail in the first system in which it is used. In the following, we list each of the 19 systems described in ...
... described with an example in the text. (CW refers to cover Work.) CW Dependent CW Independent Message Message Existence Steganographic Covert Hidden Watermarking Communication (Example 1) (Example 2) Existence Non-steganographic Overt ...
... described a machine-detectable pattern that could be placed on documents for anti-counterfeiting purposes. Nine years later, Holt et al. [119] described a method for embedding an identification code in an audio signal. However, it was ...
... described in Section 2.2.7, and elaborated upon in Chapter 9, anybody who can detect a watermark can probably remove it. Thus, because Bob can easily obtain a Digimarc detector, he can remove Alice's watermark and replace it with his ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |