Statements (52)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:technology
|
gptkbp:application |
authentication
copyright protection broadcast monitoring data hiding tamper detection |
gptkbp:can_be_attacked_by |
compression
cropping noise addition collusion attack geometric attack removal attack |
gptkbp:can_be_embedded_by |
watermark embedder
|
gptkbp:canBe |
fragile
visible invisible robust reversible irreversible semi-fragile |
gptkbp:challenge |
gptkb:security
capacity perceptual transparency robustness to attacks |
gptkbp:detects |
watermark detector
|
gptkbp:field |
digital signal processing
information security |
gptkbp:goal |
detect unauthorized use
prove ownership trace distribution verify integrity |
https://www.w3.org/2000/01/rdf-schema#label |
digital watermarking
|
gptkbp:method |
spread spectrum
frequency domain techniques quantization index modulation spatial domain techniques |
gptkbp:proposedBy |
1990s
|
gptkbp:relatedTo |
cryptography
barcode digital rights management QR code fingerprinting steganography |
gptkbp:standardizedBy |
gptkb:JPEG
gptkb:MPEG |
gptkbp:used_in |
gptkb:DVD
gptkb:software audio images documents |
gptkbp:bfsParent |
gptkb:Karp–Rabin_algorithm
|
gptkbp:bfsLayer |
5
|