The Control Technology of Integrity and Legitimacy of LUT-Oriented Information Object Usage by Self-Recovering Digital Watermark
نویسندگان
چکیده
The paper proposes the technology of control of integrity and legitimacy of information object usage with the Look Up Table-oriented (LUToriented) architecture. The technology is based on embedding the self-recovery digital watermark into information objects of such kind. The technology is the composition of approaches to forming the self-recovery digital watermarks in the passive multimedia containers, and approaches to embedding the extra information into LUT-containers. The process of embedding the extra information occurs with the help of classification of container elements and their purposeful modification within the set of the formed classes. The procedure of immediate embedding the data at the level of LUT-container elementary parts includes the value inversion of current processed LUT unit and propagation of the inversion around all the inputs of LUT units connected to the current unit output. The description of practical realization of the proposed technology is represented.
منابع مشابه
Digital Watermarking Technology in Different Domains
Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...
متن کاملObject-Oriented Method for Automatic Extraction of Road from High Resolution Satellite Images
As the information carried in a high spatial resolution image is not represented by single pixels but by meaningful image objects, which include the association of multiple pixels and their mutual relations, the object based method has become one of the most commonly used strategies for the processing of high resolution imagery. This processing comprises two fundamental and critical steps towar...
متن کاملCritical Success Factors of Digital Libraries in Iran: A Qualitative Research
Background and Aim: Myriad of IT projects failed in recent years. Digital libraries (DLs) as the product of the usage of IT in the library organization followed a similar trend. This paper studies the critical success factors (CSFs) of DLs in the context of Iran, with special focus on the Iranian Ministry of Science, Research, and Technology. CSFs, in this paper, are those factors that if follo...
متن کاملSelf-Constructing Fragile Watermark Algorithm for Relational Database Integrity Proof
Database watermarking has gained a keen interest of researchers since the coin was tossed by Agarwal. Since then many approaches have been adopted to protect the copyright of relational databases. The concept was proposed after getting inspiration from watermarking digital assets. Watermarking has been helpful in integrity check of relational databases as well and so far techniques have been pr...
متن کامل3D Scene and Object Classification Based on Information Complexity of Depth Data
In this paper the problem of 3D scene and object classification from depth data is addressed. In contrast to high-dimensional feature-based representation, the depth data is described in a low dimensional space. In order to remedy the curse of dimensionality problem, the depth data is described by a sparse model over a learned dictionary. Exploiting the algorithmic information theory, a new def...
متن کامل