Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 85.
... obtain extracting a fixed a vector closest from point the in 64 unwatermarked space that is likely image, to lie the ... obtain a sequence of 1,380 bits. It then identifies the sublattice that corresponds to this sequence of bits and ...
... obtain a specified percepSystem Perceptually 14: Shaped E–PERC Embedding –SHAPE/D– and LC ... obtained by applying Watson's model to the cover image. This amplifies the pattern in areas where the image can easily hide noise, and ...
... obtain an unprotected copy of the content, and then proceed to distribute illegal copies. In other words, cryptography can protect content in transit, but once decrypted, the content has no further protection. Thus, there is a strong ...
... obtained. A famous case in which the loss of text on an image caused just such problems is a photograph of Lena Sj ̈o ̈oblom. This is perhaps the most common test image in image processing research and has appeared in countless journal ...
... obtain a Digimarc detector, he can remove Alice's watermark and replace it with his own. To achieve the level of security required for proof of ownership, it is probably necessary to restrict the availability of the detector. When an ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |