A Copyright Protection using Watermarking Algorithm
نویسندگان
چکیده
منابع مشابه
A Copyright Protection using Watermarking Algorithm
In this paper, a digital watermarking algorithm for copyright protection based on the concept of embed digital watermark and modifying frequency coefficients in discrete wavelet transform (DWT) domain is presented. We embed the watermark into the detail wavelet coefficients of the original image with the use of a key. This key is randomly generated and is used to select the exact locations in t...
متن کاملCopyright Protection using Digital Watermarking
One way for copyright protection is digital watermarking. Digital watermarking is the process of embedding information regarding the authenticity or the identity of the owners into a image or any piece of data. Digital watermarking has been classified into two types :Visible and Invisible Watermarking. In visible digital watermarking, the embedded information is visible. Typically, the informat...
متن کاملUsing Digital Watermarking for Copyright Protection
Without a doubt, the Internet has revolutionized the way we access information and share our ideas via tools such as Facebook, twitter, email, forums, blogs and instant messaging. The Internet is also an excellent distribution system for digital media. It is inexpensive, eliminates warehousing and delivery, and is almost instantaneous. Together with the advances of compression techniques such a...
متن کاملA Novel Audio Aggregation Watermarking Algorithm Based on Copyright Protection
A novel algorithm of audio aggregation watermarking was proposed in this paper for copyright protection. The algorithm not only protects copyright of a single audio in audio aggregation but also protects copyright of the whole audio aggregation. The experimental results showed the watermark of aggregate audio can resist to some attacks, for example, deleting audio, and substituting audio; at th...
متن کاملA robust software watermarking for copyright protection
This paper advocates protecting software copyright through hiding watermarks in various data structures used by the code, e.g., Bþ-trees, R-trees, linked lists, etc. Prior proposals hide the watermarks in dummy data structures, e.g., linked lists and graphs that are created, solely for this reason, during the execution of the hosting software. This makes them vulnerable to subtractive attacks, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2006
ISSN: 0868-4952,1822-8844
DOI: 10.15388/informatica.2006.132