Digital WatermarkingElsevier, 2001. gada 17. okt. - 542 lappuses Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications. |
No grāmatas satura
1.–5. rezultāts no 39.
... sign of the bit determines whether it is added or subtracted. It then multiplies the message pattern by a scaling factor and adds it to the image. The D– eight reference SIMPLE patterns –8 detector and uses. χχ. EXAMPLE WATERMARKING ...
... scaling by is Watson's automatically perceptual chosen model. to obtain a specified percepSystem Perceptually 14 ... scaling factor for the entire reference pattern the E–PERC– SHAPE embedder first perceptually shapes the pattern. The ...
... scaling each term of the reference pattern's block DCT. This shaping is optimal in the sense that the resulting pattern yields the highest possible correlation with the reference pattern for a given perceptual distance (as measured by ...
... printing and scanning, and geometric distortions (rotation, translation, scaling, and so on). Video watermarks may need to be 2.2.7 robust to many of the same transformations, as well. 30. CHAPTER TWO: APPLICATIONS AND PROPERTIES.
... scaling, high-pass filtering, or any of a wide variety of degradations that occur only prior to the embedding of the watermark or after its detection. Thus, for example, a watermark for broadcast monitoring need not be robust to VHS ...
Saturs
1 | |
11 | |
Chapter 3 Models of Watermarking | 41 |
Chapter 4 Basic Message Coding | 85 |
Chapter 5 Watermarking with Side Information | 117 |
Chapter 6 Analyzing Errors | 157 |
Chapter 7 Using Perceptual Models | 201 |
Chapter 8 Robust Watermarking | 241 |
Appendix A Background Concepts | 359 |
Appendix B Selected Theoretical Results | 373 |
Appendix C Source Code | 395 |
Appendix D Notation and Common Variables | 483 |
Glossary | 487 |
501 | |
521 | |
About the Authors | 541 |
Citi izdevumi - Skatīt visu
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox Ierobežota priekšskatīšana - 2005 |
Digital Watermarking: Third International Workshop, IWDW 2004, Seoul, Korea ... Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Ierobežota priekšskatīšana - 2005 |
Bieži izmantoti vārdi un frāzes
Atsauces uz šo grāmatu
Multimedia Encryption and Watermarking Borko Furht,Edin Muharemagic,Daniel Socek Priekšskatījums nav pieejams - 2005 |