Digital Watermarking. Steinebach, M., Dittmann, J., & Neuhold, E. In Encyclopedia of Multimedia, pages 181–186. Springer US, 2008. 00059Paper abstract bibtex DefinitionDigital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).Digital Watermarking. Figure 1.Difference between cover and marked cover.Common Watermarking TechniquesWatermarking files or streams often r ...
@incollection{steinebach_digital_2008,
title = {Digital {Watermarking}},
copyright = {©2008 Springer-Verlag},
isbn = {978-0-387-74724-8 978-0-387-78414-4},
url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_303},
abstract = {DefinitionDigital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).Digital Watermarking. Figure 1.Difference between cover and marked cover.Common Watermarking TechniquesWatermarking files or streams often r ...},
language = {en},
urldate = {2016-05-03},
booktitle = {Encyclopedia of {Multimedia}},
publisher = {Springer US},
author = {Steinebach, Martin and Dittmann, Jana and Neuhold, Erich},
editor = {Furht, Borko},
year = {2008},
note = {00059},
pages = {181--186}
}
Downloads: 0
{"_id":"LhAMt3cT7E8bbGaMc","bibbaseid":"steinebach-dittmann-neuhold-digitalwatermarking-2008","authorIDs":[],"author_short":["Steinebach, M.","Dittmann, J.","Neuhold, E."],"bibdata":{"bibtype":"incollection","type":"incollection","title":"Digital Watermarking","copyright":"©2008 Springer-Verlag","isbn":"978-0-387-74724-8 978-0-387-78414-4","url":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_303","abstract":"DefinitionDigital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).Digital Watermarking. Figure 1.Difference between cover and marked cover.Common Watermarking TechniquesWatermarking files or streams often r ...","language":"en","urldate":"2016-05-03","booktitle":"Encyclopedia of Multimedia","publisher":"Springer US","author":[{"propositions":[],"lastnames":["Steinebach"],"firstnames":["Martin"],"suffixes":[]},{"propositions":[],"lastnames":["Dittmann"],"firstnames":["Jana"],"suffixes":[]},{"propositions":[],"lastnames":["Neuhold"],"firstnames":["Erich"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Furht"],"firstnames":["Borko"],"suffixes":[]}],"year":"2008","note":"00059","pages":"181–186","bibtex":"@incollection{steinebach_digital_2008,\n\ttitle = {Digital {Watermarking}},\n\tcopyright = {©2008 Springer-Verlag},\n\tisbn = {978-0-387-74724-8 978-0-387-78414-4},\n\turl = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_303},\n\tabstract = {DefinitionDigital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).Digital Watermarking. Figure 1.Difference between cover and marked cover.Common Watermarking TechniquesWatermarking files or streams often r ...},\n\tlanguage = {en},\n\turldate = {2016-05-03},\n\tbooktitle = {Encyclopedia of {Multimedia}},\n\tpublisher = {Springer US},\n\tauthor = {Steinebach, Martin and Dittmann, Jana and Neuhold, Erich},\n\teditor = {Furht, Borko},\n\tyear = {2008},\n\tnote = {00059},\n\tpages = {181--186}\n}\n\n","author_short":["Steinebach, M.","Dittmann, J.","Neuhold, E."],"editor_short":["Furht, B."],"key":"steinebach_digital_2008","id":"steinebach_digital_2008","bibbaseid":"steinebach-dittmann-neuhold-digitalwatermarking-2008","role":"author","urls":{"Paper":"http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_303"},"downloads":0,"html":""},"bibtype":"incollection","biburl":"http://www.telemidia.puc-rio.br/~alan/files/all.bib","creationDate":"2020-03-03T14:08:14.755Z","downloads":0,"keywords":[],"search_terms":["digital","watermarking","steinebach","dittmann","neuhold"],"title":"Digital Watermarking","year":2008,"dataSources":["jAxurbvLP8q5LTdLa"]}