IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Introduction in Digital Watermarking: Applications, Principles, and Problems

An Introduction in Digital Watermarking: Applications, Principles, and Problems
View Sample PDF
Author(s): Tino Jahnke (University of Cooperative Education, Heidenheim, Germany)and Juergen Seitz (University of Cooperative Education Heidenheim, Germany)
Copyright: 2004
Pages: 25
Source title: E-Commerce and M-Commerce Technologies
Source Author(s)/Editor(s): P. Candace Deans (University of Richmond, USA)
DOI: 10.4018/978-1-59140-566-5.ch006

Purchase

View An Introduction in Digital Watermarking: Applications, Principles, and Problems on the publisher's website for pricing and purchasing information.

Abstract

In order to solve intellectual property problems of the digital age, two basic procedures are used: “Buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful right protection mechanisms. Digital watermarks are mostly inserted as a plain bit sample or a transformed digital signal into the source data using a key based embedding algorithm and a pseudo-noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology a trade-off has to be made between competing criteria like robustness, non-perceptibility, non-delectability, and security. Most watermarking algorithms are resistant against selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can destroy easily the watermark or falsify it. This chapter gives an overview in watermarking technologies, classification, methodology, applications and problems.

Related Content

Simriti Popli, Gabriel Wasswa. © 2024. 12 pages.
Pooja Lekhi. © 2024. 8 pages.
Shailey Singh. © 2024. 12 pages.
Shailey Singh. © 2024. 9 pages.
Tanuj Surve, Tuan Nguyen. © 2024. 17 pages.
Pawan Kumar, Sanjay Taneja, Mukul Bhatnagar, Arvinder K. Kaur. © 2024. 17 pages.
Azadeh Eskandarzadeh. © 2024. 15 pages.
Body Bottom