Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 75.
... message being encoded. received The D– image LC linear and correlation ... mark, wr, is scaled and either added to or subtracted from vo. This yields a ... mark using the correlation coefficient. System 8-Bit the message E– Blind BLIND 4 ...
... message. The detector does not distinguish between marked and unwatermarked images. System 5: Trellis-Coding E ... mark, which is embedded into the 8×8 average of blocks in the image, in the same way as the E– TRELLIS– BLK – BLIND embedder.
... mark. CC system. The D–BLK–CC detector BLK–BLIND/D–BLK– System 8: E– Block ... message. The E– DIRTY–PAPER/D–DIRTY– embedder, DIRTY except –PAPER that ... mark that already has the highest correlation with the extracted vector is the one ...
... message Watermark Detected embedder Watermarked Work Watermark detector ... mark was embedded, and the monitoring of broadcast channels looking for ... message is secret. An oft-cited example of steganography is a story from Herodotus ...
... message against the original signature, he will find that the signatures do ... mark. Authentication marks designed to become invalid after even the ... mark is modified, the mark is modified along with it. This opens up the possibility ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |