Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 63.
... indicates the authenticity of the bill). In addition to paper, watermarking can be applied to other physical objects and to electronic signals. Fabrics, garment labels, and product packaging are examples of physical objects that can be ...
... indicates this fact, along with the warning that the images may not be reproduced. Knowledge that an invisible watermark is embedded in each image helps deter piracy. Overt, embedded communication refers to the known transmission of ...
... indicate the sizes of original sheets. It was also about this time that watermarks began to be used as anticounterfeiting measures on money and other documents. The termwatermarkseems to have been coined near the end of the eighteenth ...
... mean “Father Francesco Columna loves Polia.”5 Four hundred years later, we find the first example of a technology ... indicated that the notch filter had been applied and the duration of the absence used to code either a dot or a dash ...
... indicating the context in which it is to be applied. stations. We can use watermarks for broadcast monitoring by putting a unique watermarkin each video or sound clip prior 1. Introduction to broadcast. Automated monitoring stations can ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |