Javascript must be enabled to continue!
Digital Watermarking for Multimedia Transaction Tracking
View through CrossRef
This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed. In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes. Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work. In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented. Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.
Title: Digital Watermarking for Multimedia Transaction Tracking
Description:
This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology.
The existing watermarking schemes are summarized and their assumptions as well as the limitations for tracking are analyzed.
In particular, an Independent Component Analysis (ICA)-based watermarking scheme is proposed, which can overcome the problems of the existing watermarking schemes.
Multiple watermarking technique is exploited—one watermark to identify the rightful owner of the work and the other one to identify the legal user of a copy of the work.
In the absence of original data, watermark, embedding locations and strengths, the ICA-based watermarking scheme is introduced for efficient watermark extraction with some side information.
The robustness of the proposed scheme against some common signal-processing attacks as well as the related future work are also presented.
Finally, some challenging issues in multimedia transaction tracking through digital watermarking are discussed.
Related Results
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy...
Multimedia Representation
Multimedia Representation
In recent years, the rapid expansion of multimedia applications, partly due to the exponential growth of the Internet, has proliferated over the daily life of computer users (Yang ...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract
In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the express...
Multimedia Encryption
Multimedia Encryption
Multimedia technology becomes more and more popular in today’s digitized and networked world. Many multimedia-based services, such as pay-TV, remote video conferencing, medical ima...
Implementasi Multimedia Software Engineering Methodology Pada Pembuatan Perangkat Promosi Wisata
Implementasi Multimedia Software Engineering Methodology Pada Pembuatan Perangkat Promosi Wisata
Abstract—Artikel ini membahas tentang perbedaan antara multimedia interaktif dan non-interaktif. Multimedia non-interaktif ditampilkan dalam format linier dan pengguna tidak dapat ...
Access Denied
Access Denied
Introduction
As social-distancing mandates in response to COVID-19 restricted in-person data collection methods such as participant observation and interviews, researchers turned t...
Is a Fitbit a Diary? Self-Tracking and Autobiography
Is a Fitbit a Diary? Self-Tracking and Autobiography
Data becomes something of a mirror in which people see themselves reflected. (Sorapure 270)In a 2014 essay for The New Yorker, the humourist David Sedaris recounts an obsession spu...

