Jahnke et al., 2005 - Google Patents
An introduction in digital watermarking: Applications, principles, and problemsJahnke et al., 2005
View PDF- Document ID
- 3215909627076304901
- Author
- Jahnke T
- Seitz J
- Publication year
- Publication venue
- E-Commerce and M-Commerce Technologies
External Links
Snippet
In order to solve intellectual property problems of the digital age, two basic procedures are used:“Buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations …
- 238000000034 method 0 abstract description 96
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Arnold et al. | Techniques and applications of digital watermarking and content protection | |
| Singh et al. | A survey of digital watermarking techniques, applications and attacks | |
| Barni et al. | Data hiding for fighting piracy | |
| CN101273367B (en) | Covert and robust mark for media identification | |
| US20030016842A1 (en) | Digital content with information of latent value to purchaser and method for making the same | |
| Jahnke et al. | An introduction in digital watermarking: Applications, principles, and problems | |
| Mehta et al. | Digital image watermarking: A review | |
| Anitha | Digital watermarking: Pathway to secure! | |
| Jain et al. | Digital watermarking | |
| Katariya | Digital watermarking | |
| Jahnke et al. | An Introduction in Digital Watermarking: Applications, Principles | |
| Seitz | Digital Watermarking: Applications, Principles | |
| Yadav | Study of Information Hiding Techniques and their Counterattacks | |
| Kumari et al. | Existing trends of digital watermarking and its significant impact on multimedia streaming: A survey | |
| Sheppard et al. | Digital watermarks for copyright protection | |
| Berghel | Digital watermarking makes its mark | |
| Rao et al. | Multimedia digital rights protection using watermarking techniques | |
| Garofalakis et al. | Digital robbery; authors are not unprotected | |
| Mallick | Implementation of watermarking technique using matlab | |
| Jahnke et al. | Digital Watermarking: Methods to Protect Digital Goods against Copyright Infringement as an Assumption for a Successful E-Business Integration | |
| Sen et al. | An algorithm for digital watermarking of still images for copyright protection | |
| Srivadana | Digital watermarking | |
| Blake et al. | Digital watermarking security | |
| Al-Oqily | A Robust Discrete Cosine Transformation-Based Watermarking Algorithm for Digital Images | |
| Shaw | JISC Technology Applications Programme (JTAP)—Overview of Watermarks, Fingerprints, and Digital Signatures |