Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 91.
... Embedding simply adds E a – pattern BLIND/D and Linear to –LC an Correlation ............................................50 ... embed 8 The ..................................96 each E– 8-bit SIMPLE of messages. –8 embedder It first is ...
... embeds 8-bit messages using is redundantly trellis-coded encoded modulation. as a sequence In the E– of symbols ... embed the mark, and then modifying the image so that it will yield the new extracted vector. However, rather than ...
... Embedding and Whitened Linear Correlation Detection: This system explores the effects of applying a whitening filter in linear correlation detection. It uses the E– BLIND/D– BLIND embedding algorithm introduced in System 1. The ...
... Embedding –OPT/D– and LC Linear . . . . . . Correlation . . . . . . . . . . . Detection: . . . . . . . . . . This . . . . system . . . . . . . is 235 essentially the same as System 14. The only difference is that perceptual shaping is ...
... embedded. If enough bits match, the detector declares that the watermark is present. The D– DCTQ detector can be modified to yield localized information about where an image has been corrupted. This is done by checking the number of ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |