Watermarking SecurityA Quick Tour of Watermarking Techniques
Watermarking Security: A Quick Tour of Watermarking Techniques
Bas, Patrick; Furon, Teddy; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin
2016-06-22 00:00:00
[In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the embedding function, the decoding/detection function) and then its geometrical interpretation. Then we present the most popular class of watermarking schemes: spread-spectrum watermarking and watermarking techniques based on the idea of dirty paper codes.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/watermarking-security-a-quick-tour-of-watermarking-techniques-OCJ5JDRmzX
Watermarking SecurityA Quick Tour of Watermarking Techniques
[In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the embedding function, the decoding/detection function) and then its geometrical interpretation. Then we present the most popular class of watermarking schemes: spread-spectrum watermarking and watermarking techniques based on the idea of dirty paper codes.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.