Digital Watermarking. Steinebach, M., Dittmann, J., & Neuhold, E. In Encyclopedia of Multimedia, pages 181–186. Springer US, 2008. 00059
Digital Watermarking [link]Paper  abstract   bibtex   
DefinitionDigital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).Digital Watermarking. Figure 1.Difference between cover and marked cover.Common Watermarking TechniquesWatermarking files or streams often r ...
@incollection{steinebach_digital_2008,
	title = {Digital {Watermarking}},
	copyright = {©2008 Springer-Verlag},
	isbn = {978-0-387-74724-8 978-0-387-78414-4},
	url = {http://link.springer.com/referenceworkentry/10.1007/978-0-387-78414-4_303},
	abstract = {DefinitionDigital watermarking techniques are based on information hiding techniques similar to steganographic approaches with the overall goal to embed information into a cover signal, usually multi media data.The term digital watermarking was used for the first time by [1], actually written in two words: “water mark.” Instead of a confidential or hidden communication, watermarking addresses the security aspects of data and user authentication or data integrity protection, where a digital watermark is a perceptually transparent pattern inserted in digital data using an embedding algorithm and an embedding key. A detection algorithm using the appropriate detection key can retrieve the watermark information. In most approaches the embedding and detection keys are secret, see more details in [2] or [3] (Fig 1).Digital Watermarking. Figure 1.Difference between cover and marked cover.Common Watermarking TechniquesWatermarking files or streams often r ...},
	language = {en},
	urldate = {2016-05-03},
	booktitle = {Encyclopedia of {Multimedia}},
	publisher = {Springer US},
	author = {Steinebach, Martin and Dittmann, Jana and Neuhold, Erich},
	editor = {Furht, Borko},
	year = {2008},
	note = {00059},
	pages = {181--186}
}

Downloads: 0