Digital watermarking : an overview
Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and low-cost storage devices. R...
Main Authors: | , |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/21547/ http://irep.iium.edu.my/21547/ http://irep.iium.edu.my/21547/1/Chapter_14.pdf |
id |
iium-21547 |
---|---|
recordtype |
eprints |
spelling |
iium-215472012-08-24T02:13:52Z http://irep.iium.edu.my/21547/ Digital watermarking : an overview Khalifa, Othman Omran Yusof, Yusnita TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and low-cost storage devices. Research community and industry has shown extensive interests in developing and implementing possible solutions via digital watermarking. Digital watermarking can be defined as the process of embedding a certain piece of information (technically known as watermark) into multimedia content including text documents, images, audio or video streams, where the watermark can be detected or extracted later to make an assertion about the data [1]. A generalized watermark model consists of watermark encoding and detection processes as shown in Figure 14.1 and Figure 14.2 [2]. The inputs to the embedding process are the watern1ark, the cover object and a secret key. The key is used to enforce security and to protect the watermark. The output of the watermarking scheme is the watermarked data. The channel for the watermarked data could be a lossy, noisy, unreliable channel. Thus the received data may be different from the original watermarked data. The inputs for extraction are the received watermarked data and the key corresponding to the embedding key. The output of the watermark recovery process is the recovered wat IIUM Press 2011 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/21547/1/Chapter_14.pdf Khalifa, Othman Omran and Yusof, Yusnita (2011) Digital watermarking : an overview. In: Multimedia Encryption, Transmission and Authentication. IIUM Press, Kuala Lumpur, pp. 135-142. ISBN 978-967-418-160-4 http://rms.research.iium.edu.my/bookstore/default.aspx |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Khalifa, Othman Omran Yusof, Yusnita Digital watermarking : an overview |
description |
Digital watermarking has been inspired from security concerns over multimedia contents due to the advances of computer technology. Nowadays, it is easy to obtain, manipulate, distribute and store these contents due to evolution of Internet, excellent multimedia tools and
low-cost storage devices. Research community and industry has shown extensive interests in developing and implementing possible solutions via digital watermarking. Digital watermarking can be defined as the process of embedding a certain piece of information (technically known as watermark) into multimedia content including text documents, images, audio or video streams, where the watermark can be detected or extracted later to make an
assertion about the data [1]. A generalized watermark model consists of watermark encoding and detection processes as shown in Figure 14.1 and Figure 14.2 [2]. The inputs to the
embedding process are the watern1ark, the cover object and a secret key. The key is used to enforce security and to protect the watermark. The output of the watermarking scheme is the watermarked data. The channel for the watermarked data could be a lossy, noisy, unreliable
channel. Thus the received data may be different from the original watermarked data. The inputs for extraction are the received watermarked data and the key corresponding to the embedding key. The output of the watermark recovery process is the recovered wat |
format |
Book Chapter |
author |
Khalifa, Othman Omran Yusof, Yusnita |
author_facet |
Khalifa, Othman Omran Yusof, Yusnita |
author_sort |
Khalifa, Othman Omran |
title |
Digital watermarking : an overview |
title_short |
Digital watermarking : an overview |
title_full |
Digital watermarking : an overview |
title_fullStr |
Digital watermarking : an overview |
title_full_unstemmed |
Digital watermarking : an overview |
title_sort |
digital watermarking : an overview |
publisher |
IIUM Press |
publishDate |
2011 |
url |
http://irep.iium.edu.my/21547/ http://irep.iium.edu.my/21547/ http://irep.iium.edu.my/21547/1/Chapter_14.pdf |
first_indexed |
2023-09-18T20:32:46Z |
last_indexed |
2023-09-18T20:32:46Z |
_version_ |
1777408846602436608 |