Statements (52)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:technology
|
| gptkbp:application |
authentication
copyright protection broadcast monitoring data hiding tamper detection |
| gptkbp:can_be_attacked_by |
compression
cropping noise addition collusion attack geometric attack removal attack |
| gptkbp:can_be_embedded_by |
watermark embedder
|
| gptkbp:canBe |
fragile
visible invisible robust reversible irreversible semi-fragile |
| gptkbp:challenge |
gptkb:security
capacity perceptual transparency robustness to attacks |
| gptkbp:detects |
watermark detector
|
| gptkbp:field |
digital signal processing
information security |
| gptkbp:goal |
detect unauthorized use
prove ownership trace distribution verify integrity |
| gptkbp:method |
spread spectrum
frequency domain techniques quantization index modulation spatial domain techniques |
| gptkbp:proposedBy |
1990s
|
| gptkbp:relatedTo |
gptkb:barcode
cryptography digital rights management QR code fingerprinting steganography |
| gptkbp:standardizedBy |
gptkb:JPEG
gptkb:MPEG |
| gptkbp:used_in |
gptkb:DVD
gptkb:software audio images documents |
| gptkbp:bfsParent |
gptkb:Karp–Rabin_algorithm
|
| gptkbp:bfsLayer |
5
|
| https://www.w3.org/2000/01/rdf-schema#label |
digital watermarking
|