Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In the recent years, several digital watermarking applications have been developed for copyright protection of digital images. In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photography and web industry. We have also identified areas in which the software should be improved in order to meet current and future requirements of the industry.
Słowa kluczowe
Rocznik
Tom
Strony
21--25
Opis fizyczny
Bibliogr. 13 poz., rys., tab.
Twórcy
autor
- Institute of Information Technology, Technical University of Lodz, 215 Wólczańska St., 90-924 Łódź, Poland, piotr.kazimierz.lipinski@gmail.com
Bibliografia
- [1] S. Decker, “Engineering considerations in commercial watermarking”, IEEE Communications Magazine 4, 128–133 (2001).
- [2] I.J. Cox, M.L. Miller, and J.A. Bloom, Digital Watermarking, Morgan Kaufmann, Berlin, 2001.
- [3] G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD”, Computer Standards & Interfaces 31, 2002–1013 (2009).
- [4] W.H. Lin, Y.R. Wang, and S.J. Horng, “A wavelet-tree-based watermarking method using distance vector of binary cluster”, Expert Systems with Applications 36, 9869–9878 (2009)
- [5] I.J. Cox, M.L. Miller, J.A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufman Publishers, Berlin, 2008.
- [6] T.F. Rodriguez and D.A. Cushman, “Optimized selection of benchmark test parameters for image watermark algorithms based on Taguchi methods and corresponding influence on design decisions for real world applications”, Security and Watermarking of Multimedia Contents 5, 215–228 (2003).
- [7] D. Aucsmith, “Attacks on copyright marking systems”, Lecture Notes in Computer Science 1, 218–222 (1998).
- [8] J. Tian, “Reversible watermarking by difference expansion”, Proc. Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis 1, 19–22 (2002).
- [9] A.M. Alattar, “Reversible watermark using difference expansion of quads”, IEEE Int. Conf. on Acoustics, Speech, and Signal Processing ICASSP 29, 377–380 (2004).
- [10] A.M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform”, IEEE Trans. on Image Processing 1 (8), 1147–1156 (2004).
- [11] J. Stach and A.M. Alattar, “Security, stenography, and watermarking of multimedia contents”, SPIE Conf. 1 (6), 386–396 (2004).
- [12] H. Brunk, “Host-aware spread spectrum watermark embedding techniques”, Security and Watermarking of Multimedia Contents Conf. 5020 (5), 699–707 (2003).
- [13] A.M. Alattar, “Smart images using Digimarc’s watermarking technology”, 12th Int. Symposium on Electronic Imaging. 3971 (25), CD-ROM (2000).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPG8-0048-0034