Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 93.
... reference Detection: pattern The blind is scaled embedderE by a strength ... mark, wr, is scaled and either added to or subtracted from vo. This yields a ... reference mark using the correlation coefficient. System 8-Bit the message E ...
... reference SIMPLE patterns –8 detector and uses correlates the sign the of ... mark, which is embedded into the 8×8 average of blocks in the image, in the ... mark, and tests for that message mark using the correlation coefficient. System ...
... mark that already has the highest correlation with the extracted vector is the one that is embedded. an The extracted D–DIRTY vector –PAPER and all detector the reference computes marks. the correlation If the highest coefficients ...
... reference detector pattern applies before a computing whitening the filter ... mark. System Perceptually 13: Limited E–LC ... reference mark is similar and adds to the it E to –BLIND the image. embedder However, in that, in E– PERC– tual ...
... reference we have found[14]isassigned to the Muzak Corporation, famous for providing “elevator music”, and may be the source of the many rumors that Muzak contained subliminal messages. Fig. 2.2 Example of a unique identification code ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |