Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 90.
... Detection by Correlation 75 3.5.1 Linear Correlation 76 3.5.2 Normalized Correlation 77 3.5.3 Correlation Coefficient 80 Summary 82 4 Basic Message Coding 85 ... Detection by Detecting Individual Symbols 106 4.3.3 Detection by. viii.
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Mathew Miller. 4.3.2 Detection by Detecting Individual Symbols 106 4.3.3 Detection by Comparing against Quantized Vectors 108 4.4 Summary 114 5 Watermarking with Side Information 117 5.1 ...
... Detection: pattern The blind is scaled embedderE by a strength –BLIND parameter,α, prior to being added to the image. Its sign is dictated by the message being encoded. received The D– image LC linear and correlation detector calculates ...
... Detection: This system explores the effects of whitening on correlation-coefficient detection. It uses the E– BLK– BLIND/D–WHITE–BLK– BLIND embedding algorithm introduced in System 3. The D– BLK– CC detector first extracts a 64 vector ...
... detection: blind and informed detection, false positive behavior, and robustness. The next two properties, security and the use of secret keys, are closely related in that the use of keys is usually an integral part of any security ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |