TU Darmstadt / ULB / TUbiblio

Robust hash controlled watermark embedding

Steinebach, Martin and Zmudzinski, Sascha and Butt, Moazzam
Katzenbeisser, Stefan and Dittmann, Jana and Vielhauer, Claus (eds.) (2010):
Robust hash controlled watermark embedding.
In: Workshop on Pattern Recognition for IT Security (Book of abstracts), September 22-24, 2010, Darmstadt, Germany; in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition (DAGM 2010), In: TUD Tuprints, [Conference or Workshop Item]

Abstract

The process of embedding a digital watermark into a media file is often complex and time consuming as multiple operations take place within the process to ensure a high level of perceived quality of the marked copy and a high robustness of the embedded watermark. So far, improvements of the watermarking algorithms also lead to a higher complexity of the embedding process: State of the art watermarking algorithms require spectral transformation operations as well as windowing and perceptual models for masking the embedded watermark. Our new concept is to set up a collection of already computed watermarking signals and mix them with the cover signal for fast and simple embedding. To ensure that the watermark signal is well suited for the embedding position with respect to masking, we suggest using robust hash technology.

Item Type: Conference or Workshop Item
Erschienen: 2010
Editors: Katzenbeisser, Stefan and Dittmann, Jana and Vielhauer, Claus
Creators: Steinebach, Martin and Zmudzinski, Sascha and Butt, Moazzam
Title: Robust hash controlled watermark embedding
Language: German
Abstract:

The process of embedding a digital watermark into a media file is often complex and time consuming as multiple operations take place within the process to ensure a high level of perceived quality of the marked copy and a high robustness of the embedded watermark. So far, improvements of the watermarking algorithms also lead to a higher complexity of the embedding process: State of the art watermarking algorithms require spectral transformation operations as well as windowing and perceptual models for masking the embedded watermark. Our new concept is to set up a collection of already computed watermarking signals and mix them with the cover signal for fast and simple embedding. To ensure that the watermark signal is well suited for the embedding position with respect to masking, we suggest using robust hash technology.

Title of Book: Workshop on Pattern Recognition for IT Security (Book of abstracts), September 22-24, 2010, Darmstadt, Germany; in conjunction with the 32nd Annual Symposium of the German Association for Pattern Recognition (DAGM 2010)
Series Name: TUD Tuprints
Number: 2273
Uncontrolled Keywords: Secure Data
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Date Deposited: 30 Dec 2016 20:23
Identification Number: TUD-CS-2010-0229
Export:
Suche nach Titel in: TUfind oder in Google

Optionen (nur für Redakteure)

View Item View Item