Digital Watermarking and Its Impact on Intellectual Property Limitation for the Digital Age

Digital Watermarking and Its Impact on Intellectual Property Limitation for the Digital Age

Tino Jahnke, Juergen Seitz
Copyright: © 2007 |Pages: 13
ISBN13: 9781591409328|ISBN10: 1591409322|ISBN13 Softcover: 9781591409335|EISBN13: 9781591409342
DOI: 10.4018/978-1-59140-932-8.ch013
Cite Chapter Cite Chapter

MLA

Jahnke, Tino, and Juergen Seitz. "Digital Watermarking and Its Impact on Intellectual Property Limitation for the Digital Age." Utilizing and Managing Commerce and Services Online, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2007, pp. 275-287. https://doi.org/10.4018/978-1-59140-932-8.ch013

APA

Jahnke, T. & Seitz, J. (2007). Digital Watermarking and Its Impact on Intellectual Property Limitation for the Digital Age. In M. Khosrow-Pour, D.B.A. (Ed.), Utilizing and Managing Commerce and Services Online (pp. 275-287). IGI Global. https://doi.org/10.4018/978-1-59140-932-8.ch013

Chicago

Jahnke, Tino, and Juergen Seitz. "Digital Watermarking and Its Impact on Intellectual Property Limitation for the Digital Age." In Utilizing and Managing Commerce and Services Online, edited by Mehdi Khosrow-Pour, D.B.A., 275-287. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-932-8.ch013

Export Reference

Mendeley
Favorite

Abstract

Digital media like audio, video, images, and other multimedia documents can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The embedded information is hidden (in low-value bits or least significant bits of picture pixels, frequency, or other value domains) and linked inseparably with the source data structure. For the optimal watermarking application a trade-off between competing criteria like robustness, nonperceptibility, nondetectability, and security has to be made. Most watermarking algorithms are not resistant against all attacks—even friendly attacks like file and data modifications can destroy the watermark very easily. This chapter gives an overview about the basic ideas of watermarking, applications for e-business, problems, and limitations.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.