Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Watermarking SecurityA Quick Tour of Watermarking Techniques

Watermarking Security: A Quick Tour of Watermarking Techniques [In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the embedding function, the decoding/detection function) and then its geometrical interpretation. Then we present the most popular class of watermarking schemes: spread-spectrum watermarking and watermarking techniques based on the idea of dirty paper codes.] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/watermarking-security-a-quick-tour-of-watermarking-techniques-OCJ5JDRmzX
Publisher
Springer Singapore
Copyright
© The Author(s) 2016
ISBN
978-981-10-0505-3
Pages
13 –31
DOI
10.1007/978-981-10-0506-0_2
Publisher site
See Chapter on Publisher Site

Abstract

[In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the embedding function, the decoding/detection function) and then its geometrical interpretation. Then we present the most popular class of watermarking schemes: spread-spectrum watermarking and watermarking techniques based on the idea of dirty paper codes.]

Published: Jun 22, 2016

Keywords: Dirty Paper Coding; Watermarking Scheme; Host Content; Decoding Region; Watermarked Content

There are no references for this article.