Cryptography Reference
In-Depth Information
use thanks to the company's partnership with Adobe. They can
be circumvented but they can withstand many casual distor-
tions. Much of their success depends on the individual algo-
rithm and the sample files.
How to Use It . Find an image, introduce some changes, and then
hope to track down the person violating your copyright. In
practice, the legal and logistical headaches may be greater than
the problems of making the watermark work. If you get re-
ally frustrated, just start suing people as some companies have
done.
Further Reading
While any of the algorithms in this topic can be used to embed
a watermark, most of the common algorithms use mechanisms
based on either the discrete cosine transform or the discrete
wavelet decomposition. Chapter 14 digs deeply into this area.
Some other suggestions are:
Digital Watermarking by Ingemar Cox, Matthew L. Miller
and Jeffrey A. Bloom is a great introduction to using wavelet
techniques to embed watermarks and hide information.
The 2007 edition is broader and it includes a good treat-
ment of steganography and steganalysis. [CMB02, CMB07]
The proceedings of the International Workshop on Digital
Watermarking are invaluable sources that track the devel-
opment of steganography using wavelets and other func-
tional decomposition. [PK03, KCR04, CKL05, SJ06]
A good conference focused on watermarking digital con-
tent is the Security, Steganography, and Watermarking of
Multimedia Contents. [DW04, DW05]
Search WWH ::




Custom Search