Digital watermarking : an overview

Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and low-cost storage devices. R...

Full description

Bibliographic Details
Main Authors: Khalifa, Othman Omran, Yusof, Yusnita
Format: Book Chapter
Language:English
Published: IIUM Press 2011
Subjects:
Online Access:http://irep.iium.edu.my/21547/
http://irep.iium.edu.my/21547/
http://irep.iium.edu.my/21547/1/Chapter_14.pdf
id iium-21547
recordtype eprints
spelling iium-215472012-08-24T02:13:52Z http://irep.iium.edu.my/21547/ Digital watermarking : an overview Khalifa, Othman Omran Yusof, Yusnita TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and low-cost storage devices. Research community and industry has shown extensive interests in developing and implementing possible solutions via digital watermarking. Digital watermarking can be defined as the process of embedding a certain piece of information (technically known as watermark) into multimedia content including text documents, images, audio or video streams, where the watermark can be detected or extracted later to make an assertion about the data [1]. A generalized watermark model consists of watermark encoding and detection processes as shown in Figure 14.1 and Figure 14.2 [2]. The inputs to the embedding process are the watern1ark, the cover object and a secret key. The key is used to enforce security and to protect the watermark. The output of the watermarking scheme is the watermarked data. The channel for the watermarked data could be a lossy, noisy, unreliable channel. Thus the received data may be different from the original watermarked data. The inputs for extraction are the received watermarked data and the key corresponding to the embedding key. The output of the watermark recovery process is the recovered wat IIUM Press 2011 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/21547/1/Chapter_14.pdf Khalifa, Othman Omran and Yusof, Yusnita (2011) Digital watermarking : an overview. In: Multimedia Encryption, Transmission and Authentication. IIUM Press, Kuala Lumpur, pp. 135-142. ISBN 978-967-418-160-4 http://rms.research.iium.edu.my/bookstore/default.aspx
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
spellingShingle TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Khalifa, Othman Omran
Yusof, Yusnita
Digital watermarking : an overview
description Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and low-cost storage devices. Research community and industry has shown extensive interests in developing and implementing possible solutions via digital watermarking. Digital watermarking can be defined as the process of embedding a certain piece of information (technically known as watermark) into multimedia content including text documents, images, audio or video streams, where the watermark can be detected or extracted later to make an assertion about the data [1]. A generalized watermark model consists of watermark encoding and detection processes as shown in Figure 14.1 and Figure 14.2 [2]. The inputs to the embedding process are the watern1ark, the cover object and a secret key. The key is used to enforce security and to protect the watermark. The output of the watermarking scheme is the watermarked data. The channel for the watermarked data could be a lossy, noisy, unreliable channel. Thus the received data may be different from the original watermarked data. The inputs for extraction are the received watermarked data and the key corresponding to the embedding key. The output of the watermark recovery process is the recovered wat
format Book Chapter
author Khalifa, Othman Omran
Yusof, Yusnita
author_facet Khalifa, Othman Omran
Yusof, Yusnita
author_sort Khalifa, Othman Omran
title Digital watermarking : an overview
title_short Digital watermarking : an overview
title_full Digital watermarking : an overview
title_fullStr Digital watermarking : an overview
title_full_unstemmed Digital watermarking : an overview
title_sort digital watermarking : an overview
publisher IIUM Press
publishDate 2011
url http://irep.iium.edu.my/21547/
http://irep.iium.edu.my/21547/
http://irep.iium.edu.my/21547/1/Chapter_14.pdf
first_indexed 2023-09-18T20:32:46Z
last_indexed 2023-09-18T20:32:46Z
_version_ 1777408846602436608