PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Watermarking software in practical applications

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In the recent years, several digital watermarking applications have been developed for copyright protection of digital images. In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photography and web industry. We have also identified areas in which the software should be improved in order to meet current and future requirements of the industry.
Rocznik
Strony
21--25
Opis fizyczny
Bibliogr. 13 poz., rys., tab.
Twórcy
autor
Bibliografia
  • [1] S. Decker, “Engineering considerations in commercial watermarking”, IEEE Communications Magazine 4, 128–133 (2001).
  • [2] I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, Morgan Kaufmann, Berlin, 2001.
  • [3] G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD”, Computer Standards & Interfaces 31, 2002–1013 (2009).
  • [4] W.H. Lin, Y.R. Wang, and S.J. Horng, “A wavelet-tree-based watermarking method using distance vector of binary cluster”, Expert Systems with Applications 36, 9869–9878 (2009)
  • [5] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufman Publishers, Berlin, 2008.
  • [6] T.F. Rodriguez and D.A. Cushman, “Optimized selection of benchmark test parameters for image watermark algorithms based on Taguchi methods and corresponding influence on design decisions for real world applications”, Security and Watermarking of Multimedia Contents 5, 215–228 (2003).
  • [7] D. Aucsmith, “Attacks on copyright marking systems”, Lecture Notes in Computer Science 1, 218–222 (1998).
  • [8] J. Tian, “Reversible watermarking by difference expansion”, Proc. Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis 1, 19–22 (2002).
  • [9] A.M. Alattar, “Reversible watermark using difference expansion of quads”, IEEE Int. Conf. on Acoustics, Speech, and Signal Processing ICASSP 29, 377–380 (2004).
  • [10] A.M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform”, IEEE Trans. on Image Processing 1 (8), 1147–1156 (2004).
  • [11] J. Stach and A.M. Alattar, “Security, stenography, and watermarking of multimedia contents”, SPIE Conf. 1 (6), 386–396 (2004).
  • [12] H. Brunk, “Host-aware spread spectrum watermark embedding techniques”, Security and Watermarking of Multimedia Contents Conf. 5020 (5), 699–707 (2003).
  • [13] A.M. Alattar, “Smart images using Digimarc’s watermarking technology”, 12th Int. Symposium on Electronic Imaging. 3971 (25), CD-ROM (2000).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPG8-0048-0034
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.