蝉为什么要脱壳| 流产后吃什么水果好| 666什么意思| gn是什么单位| 人次什么意思| 欧阳修字什么| 早上7点多是什么时辰| 西洋参吃了有什么好处| 射手座的幸运色是什么颜色| 什么植物和动物最像鸡| 以爱之名什么意思| 什么东西醒酒| 为什么叫211大学| 微米是什么单位| 为什么屁多| 1月11日什么星座| 吃了桃子不能吃什么| 孕中期头疼是什么原因| 来月经小腹痛是什么原因| 血液科是看什么病| 大侠是什么意思| 什么是ci| 90岁属什么生肖| 意大利用的什么货币| 梦见别人穿红衣服是什么意思| 监督是什么意思| 牙齿矫正挂什么科| 胃寒能吃什么水果| 什么是夜盲症| 月经提前了10天是什么原因| 绿色加红色是什么颜色| 阴道炎吃什么| 痛风吃什么好| 乳头突然疼痛什么原因| nt检查需要注意什么| apm是什么| 鲫鱼吃什么食物| 2月8号什么星座| 宁字五行属什么的| 什么叫房颤| 脾大有什么危害| 滑胎是什么意思| 傻白甜是什么意思| 手指抽筋是什么原因| 什么伤口需要打破伤风| 辟谷是什么意思| 湿气重可以吃什么| 男人结扎了有什么坏处| 寒包火感冒吃什么药| 为什么想到一个人会心痛| 本科什么意思| 筋皮是什么肉| 此是什么意思| 青筋暴起是什么原因| 黄芪什么人不能喝| 奢饰品是什么意思| 血虚吃什么中成药最好| 老花镜什么品牌好| 爱是什么颜色| 羊后马前对是什么生肖| 为什么不建议割鼻息肉| 漏尿是什么原因| 吃什么能胖起来| 也字少一竖念什么| 什么什么望外| 送朋友鲜花送什么花| 澳大利亚的国宝是什么| 字母哥什么位置| 上传下达什么意思| gummy是什么意思| 温州特产是什么| 淋巴细胞百分比偏高是什么原因| 哗众取宠是什么意思| 史努比是什么意思| 喝茶叶有什么好处| 德国人是什么人种| 中专什么时候报名| 升白针是什么药| 什么叫小三阳| 更年期出虚汗吃什么药| 白酒兑什么好喝| 属兔的和什么属相最配| 积福是什么意思| 脑梗有什么特效药| 月经期间可以喝什么茶| 胃溃疡是什么原因导致的| 桑葚和什么泡酒壮阳| 牛油果有什么营养| 看是什么意思| 正师级是什么军衔| 稽留热常见于什么病| 笑什么| below是什么意思| 郑中基为什么娶余思敏| 羊蛋是什么部位| 为什么老被蚊子咬| 艾滋病的症状是什么样| 孩子呕吐吃什么药| 西红柿和什么榨汁减肥| 啮齿类动物什么意思| 为什么突然就细菌感染了| img什么意思| 冠心吃什么药好| 老鼠长什么样子图片| 百家姓第一个姓是什么| 皮肤黄是什么原因引起的| 眉中间有竖纹代表什么| 什么地方能出生入死| 宝宝流鼻血是什么原因| 老是嗳气是什么原因| 65岁属什么| asmr是什么意思| 哥哥的女儿叫什么| 猪狗不如是什么生肖| 助听器什么价位| 黄皮是什么水果| 1964年是什么年| 生肖本命带红花是什么生肖| 船只是什么意思| grace什么意思| 巴基斯坦是什么人种| 身上起红疙瘩是什么原因| 夸加包念什么| 吃什么润肺| 喝什么可以美白| 百折不挠的意思是什么| 冬枣不能和什么一起吃| 抬举是什么意思| 心脏跳的慢吃什么好| 用甲硝唑栓有什么反应| 月经期间喝什么好排毒排污血| 马华读什么| 腰间盘膨出和突出有什么区别| 一学年是什么意思| 体检报告都检查什么| 甲胄是什么意思| 皮下囊肿挂什么科| 又什么又什么式的词语| 孕妇羊水少吃什么补的快| 下野是什么意思| jojo是什么| 耕田是什么意思| 经常喝藕粉有什么好处| p53野生型是什么意思| 耳朵长痣代表什么| 痔疮有什么特征| 右侧中耳乳突炎是什么意思| 示字旁与什么有关| 血热吃什么中成药| 起眼屎是什么原因| 带牙套是什么意思| 一什么露珠| 头发油的快是什么原因| 汝字五行属什么| 吃了阿莫西林不能吃什么| 小便尿道刺痛吃什么药| 口腔溃疡反复发作是什么原因| 补骨脂是什么东西| 睡眠不好用什么药调理| 米白色是什么颜色| 火供是什么意思| 来月经喝什么汤好| 被蝎子蛰了有什么好处| 故人什么意思| 脉搏90左右意味着什么| 你问我爱你有多深是什么歌| 夺命大乌苏是什么意思| 三伏天什么时候开始| 下焦不通吃什么中成药| 胃息肉是什么原因造成的| 子宫内膜ca是什么意思| 椰子鞋是什么牌子| 三七花泡水喝有什么功效| 苔藓是什么意思| 经常过敏是什么原因| 麦粒肿是什么原因引起的| 房颤是什么病| 喝什么茶降血脂| 黄芪什么季节喝最好| 六艺是什么| 蚯蚓是什么动物| 纳囊是什么| 2024年属什么年| 一六年属什么生肖| dha什么时候吃最好| 9号来的月经什么时候是排卵期| 排异是什么意思| 子宫大是什么原因| 省委书记什么级别| 小青蛙吃什么| 土地出让和划拨有什么区别| 舌系带长有什么影响吗| 腹胀腹痛吃什么药| left什么意思| 六七年属什么生肖| 蝴蝶喜欢吃什么| 锁骨下面的骨头叫什么| 心率变异性是什么意思| 久旱逢甘露是什么意思| 梦见摘枣吃枣是什么意思| 人为什么会有胎记| 40岁属什么生肖| 得了梅毒会有什么症状| 小肚子突出是什么原因| 咆哮是什么意思| 绿豆长什么样| 打桩是什么意思| 唵是什么意思| 增致牛仔属于什么档次| 五行什么意思| 中将相当于什么级别| 巧囊是什么原因形成的| 解脲脲原体阳性是什么病| 微信号为什么会封号| 痔疮吃什么药好| 一行是什么意思| 12月28日什么星座| 苍苍什么| 熬是什么意思| 呆滞是什么意思| 日久见人心是什么意思| 什么不得什么| 讥讽的笑是什么笑| 江小白加雪碧什么意思| 执拗是什么意思| 婴儿长牙有什么症状| 生命是什么意思| 16年是什么年| 马虎是什么意思| 验尿白细胞高是什么原因| 女人自尊心强说明什么| 生理年龄是什么意思| mpa是什么意思| 治疗褥疮用什么药| 扁桃体1度肿大是什么意思| 舌根放血有什么好处| 胃穿孔是什么症状| 什么出什么外| 什么叫邪淫| 孕妇吃冰的东西对胎儿有什么影响| 情未了什么意思| 甘油是什么成分| 薤白的俗名叫什么| 虾不能和什么水果一起吃| 枸杞和山楂泡水喝有什么功效| 儿童受凉咳嗽吃什么药| 南宁有什么好玩的地方| 1949年是什么年| 纯钛对人体有什么好处| 一直流口水是什么原因| 腿弯处的筋痛是什么原因| 1985年出生是什么命| 睡觉起来口苦是什么原因| 皮肤黑穿什么颜色的衣服显白| 一什么笑声| hi是什么| 乙肝表面抗体弱阳性什么意思| 来月经胸胀痛什么原因| 92年出生属什么| 鱼油有什么副作用| 什么时候最容易受孕| 吃狗肉有什么危害| 矫正度数是什么意思| 龙凤胎是什么意思| 百度

2017年4月16日 英超第33轮 曼联vs切尔西 全场集锦

(Redirected from Digital watermark)
百度 如果说让我许下一个祝福的话,我会说,祝福我们彼此热爱着彼此呵护着的强博更强,我相信,这里不仅仅是我一个人的精神家园。

A digital watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio, video or image data.[1] It is typically used to identify ownership of the copyright of such a signal. Digital watermarking is the process of hiding digital information in a carrier signal; the hidden information should,[2] but does not need to, contain a relation to the carrier signal. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. It is prominently used for tracing copyright infringements and for banknote authentication.

Like traditional physical watermarks, digital watermarks are often only perceptible under certain conditions, e.g. after using some algorithm.[3] If a digital watermark distorts the carrier signal in a way that it becomes easily perceivable, it may be considered less effective depending on its purpose.[3] Traditional watermarks may be applied to visible media (like images or video), whereas in digital watermarking, the signal may be audio, pictures, video, texts or 3D models. A signal may carry several different watermarks at the same time. Unlike metadata that is added to the carrier signal, a digital watermark does not change the size of the carrier signal.

The needed properties of a digital watermark depend on the use case in which it is applied. For marking media files with copyright information, a digital watermark has to be rather robust against modifications that can be applied to the carrier signal. Instead, if integrity has to be ensured, a fragile watermark would be applied.

Both steganography and digital watermarking employ steganographic techniques to embed data covertly in noisy signals. While steganography aims for imperceptibility to human senses, digital watermarking tries to control the robustness as top priority.

Since a digital copy of data is the same as the original, digital watermarking is a passive protection tool. It just marks data, but does not degrade it or control access to the data.

One application of digital watermarking is source tracking. A watermark is embedded into a digital signal at each point of distribution. If a copy of the work is found later, then the watermark may be retrieved from the copy and the source of the distribution is known. This technique reportedly has been used to detect the source of illegally copied movies.

History

edit

The term digital watermark was coined by Andrew Tirkel and Charles Osborne in December 1992. The first successful embedding and extraction of a steganographic spread spectrum watermark was demonstrated in 1993 by Andrew Tirkel, Gerard Rankin, Ron Van Schyndel, Charles Osborne, and others.[4]

Watermarks are identification marks produced during the paper-making process. The first watermarks appeared in Italy during the 13th century, but their use rapidly spread across Europe. They were used as a means to identify the paper maker or the trade guild that manufactured the paper. The marks often were created by a wire sewn onto the paper mold. Watermarks continue to be used today as manufacturer's marks and to prevent forgery.

Applications

edit

Digital watermarking may be used for a wide range of applications, such as:

Digital watermarking life-cycle phases

edit
 
General digital watermark life-cycle phases with embedding-, attacking-, and detection and retrieval functions

The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal.

Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack or tampering. While the modification may not be malicious, the term attack arises from copyright protection application, where third parties may attempt to remove the digital watermark through modification. There are many possible modifications, for example, affine transformations, lossy compression (e.g. MPEG-2), resolution reduction, standards conversion (e.g. NTSC to PAL), cropping an image or video, or intentionally adding noise.[6]

Detection (often called extraction) is an algorithm that is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change is made to the signal.

Classification

edit

A digital watermark is called robust with respect to transformations if the embedded information may be detected reliably from the marked signal, even if degraded by severe or multiple transformations. Typical image degradations are JPEG compression, rotation, cropping, additive noise, and quantization.[7] For video content, temporal modifications and MPEG compression often are added to this list. A digital watermark is called imperceptible if the watermarked content is perceptually equivalent to the original, unwatermarked content.[8] In general, it is easy to create either robust watermarks or imperceptible watermarks, but the creation of both robust and imperceptible watermarks has proven to be quite challenging.[2] Robust imperceptible watermarks have been proposed as a tool for the protection of digital content, e.g. for Compact Disc and DVD copy protection, such as an embedded no-copy-allowed flag in professional video content.[9]

Digital watermarking techniques may be classified in several ways.

Robustness

edit

A digital watermark is called fragile if it fails to be detectable after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that clearly are noticeable, commonly are not referred to as watermarks, but as generalized barcodes.

A digital watermark is called semi-fragile if it resists benign transformations, but fails detection after malignant transformations. Semi-fragile watermarks commonly are used to detect malignant transformations.

A digital watermark is called robust if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and no access control information.

Perceptibility

edit

A digital watermark is called imperceptible if the original cover signal and the marked signal are perceptually indistinguishable.

A digital watermark is called perceptible if its presence in the marked signal is noticeable (e.g. digital on-screen graphics like a network logo, content bug, codes, opaque images). On videos and images, some are made transparent/translucent for convenience for consumers due to the fact that they block portion of the view; therefore degrading it.

This should not be confused with perceptual, that is, watermarking which uses the limitations of human perception to be imperceptible.

Capacity

edit

The length of the embedded message determines two different main classes of digital watermarking schemes:

  • The message is conceptually zero-bit long and the system is designed in order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as zero-bit or presence watermarking schemes.
  • The message is an n-bit-long stream  , with   or   and is modulated in the watermark. These kinds of schemes usually are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.

Embedding method

edit

A digital watermarking method is referred to as spread-spectrum if the marked signal is obtained by an additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low information capacity due to host interference.

A digital watermarking method is said to be of quantization type if the marked signal is obtained by quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to rejection of host interference.

A digital watermarking method is referred to as amplitude modulation if the marked signal is embedded by additive modification which is similar to spread spectrum method, but is particularly embedded in the spatial domain.

Evaluation and benchmarking

edit

The evaluation of digital watermarking schemes may provide detailed information for a watermark designer or for end-users, therefore, different evaluation strategies exist. Often used by a watermark designer is the evaluation of single properties to show, for example, an improvement. Mostly, end-users are not interested in detailed information. They want to know if a given digital watermarking algorithm may be used for their application scenario, and if so, which parameter sets seems to be the best.

Cameras

edit

Epson and Kodak have produced cameras with security features such as the Epson PhotoPC 3000Z and the Kodak DC-290. Both cameras added irremovable features to the pictures which distorted the original image, making them unacceptable for some applications such as forensic evidence in court. According to Blythe and Fridrich, "[n]either camera can provide an undisputable proof of the image origin or its author".[10] A secure digital camera (SDC) was proposed by Saraju Mohanty, et al. in 2003 and published in January 2004. This was not the first time this was proposed.[11] Blythe and Fridrich also have worked on SDC in 2004 [10] for a digital camera that would use lossless watermarking to embed a biometric identifier together with a cryptographic hash.[12]

Reversible data hiding

edit

Reversible data hiding is a technique which enables images to be authenticated and then restored to their original form by removing the digital watermark and replacing the image data that had been overwritten.[13]

Watermarking for relational databases

edit

Digital watermarking for relational databases has emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, and maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. A survey of the current state-of-the-art and a classification of the different techniques according to their intent, the way they express the watermark, the cover type, granularity level, and verifiability was published in 2010 by Halder et al. in the Journal of Universal Computer Science.[14]

See also

edit

References

edit
  1. ^ H.T. Sencar, M. Ramkumar and A.N. Akansu: Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia. Academic Press, San Diego, CA, USA, 2004.
  2. ^ a b Ingemar J. Cox: Digital watermarking and steganography. Morgan Kaufmann, Burlington, MA, USA, 2008
  3. ^ a b Frank Y. Shih: Digital watermarking and steganography: fundamentals and techniques. Taylor & Francis, Boca Raton, FL, USA, 2008
  4. ^ A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A.Mee, C.F.Osborne. "Electronic Water Mark". DICTA 93, Macquarie University. p.666-673
  5. ^ Zigomitros, Athanasios; Papageorgiou, Achilleas; Patsakis, Constantinos (2012). "Social network content management through watermarking". 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE. pp. 1381–1386. doi:10.1109/TrustCom.2012.264. ISBN 978-1-4673-2172-3. S2CID 17845019.
  6. ^ Cox, I.J.; Linnartz, J.P.M.G. (1998). "Copy protection for DVD videoSome general methods for tampering with watermarks". IEEE Journal on Selected Areas in Communications. 16 (4): 587–593. doi:10.1109/49.668980.
  7. ^ Rowayda, A. Sadek (2008). "Blind Synthesis Attack on SVD Based Watermarking Techniques". 2008 International Conference on Computational Intelligence for Modelling Control & Automation. pp. 140–145. doi:10.1109/CIMCA.2008.53. ISBN 978-0-7695-3514-2. S2CID 8927498.
  8. ^ Khan, Asifullah; Mirza, Anwar M. (October 2007). "Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding". Information Fusion. 8 (4): 354–365. CiteSeerX 10.1.1.708.9509. doi:10.1016/j.inffus.2005.09.007. ISSN 1566-2535.
  9. ^ "CPTWG Home Page". cptwg.org. Archived from the original on 2025-08-06.
  10. ^ a b BLYTHE, Paul; FRIDRICH, Jessica (August 2004). "Secure digital camera" (PDF). Digital Forensic Research Workshop: 11–13. Archived (PDF) from the original on 2025-08-06. Retrieved 23 July 2018.
  11. ^ Mohanty, Saraju P.; Ranganathan, Nagarajan; Namballa, Ravi K. (2004). "VLSI implementation of visible watermarking for secure digital still camera design" (PDF). 17th International Conference on VLSI Design. Proceedings. IEEE. pp. 1063–1068. doi:10.1109/ICVD.2004.1261070. ISBN 0-7695-2072-3. S2CID 1821349. Archived from the original (PDF) on 4 March 2016.
  12. ^ Toshikazu Wada; Fay Huang (2009), Advances in Image and Video Technology, Lecture Notes in Computer Science, vol. 5414, pp. 340–341, Bibcode:2008LNCS.5414.....W, doi:10.1007/978-3-540-92957-4, ISBN 978-3-540-92956-7
  13. ^ Unretouched by human hand, The Economist, December 12, 2002
  14. ^ Halder, Raju; Pal, Shantanu; Cortesi, Agostino (2010). "Watermarking Techniques for Relational Databases: Survey, Classification and Comparison". Journal of Universal Computer Science. 16 (21): 3164–3190. CiteSeerX 10.1.1.368.1075.

Further reading

edit
edit
蚜虫长什么样 雨渐耳符咒有什么用 林俊杰的粉丝叫什么 紫荆花代表什么生肖 1989年是什么年
BE是什么 什么闻乐见 小孩为什么发烧 早晨醒来口苦是什么原因 7月28号是什么星座
热伤风感冒吃什么药 春风得意是什么生肖 什么药消肿最快最有效 什么叫戒断反应 鼻腔有臭味是什么原因
麾下是什么意思 一动就大汗淋漓是什么原因 吃什么东西可以补血 男人左手有痣代表什么 低密度脂蛋白高吃什么药
超声心动图检查什么gangsutong.com 低钾血症吃什么食补hcv9jop7ns3r.cn 1964属什么hcv8jop9ns9r.cn hp是什么意思hcv8jop7ns2r.cn 女人的逼是什么意思hcv8jop1ns1r.cn
小孩脱水有什么症状hcv9jop6ns1r.cn 哺乳期胃疼可以吃什么药xinmaowt.com 让是什么词hcv9jop5ns3r.cn 用什么泡脚可以脸上祛斑hcv9jop5ns9r.cn 加油站为什么不能打电话hanqikai.com
多动症挂什么科hcv8jop3ns6r.cn 红色象征什么hcv9jop1ns2r.cn 师级干部是什么级别hcv8jop1ns2r.cn 中指戴戒指代表什么0297y7.com 脱发吃什么维生素hcv8jop0ns8r.cn
下午三点是什么时辰hcv8jop8ns2r.cn 山东吃什么主食hcv9jop6ns1r.cn 土豆吃多了有什么坏处hcv9jop0ns5r.cn 老虎下山下一句是什么jasonfriends.com 舌头发黑是什么原因hcv8jop9ns2r.cn
百度