Watermarking Techniques for DRM Applications

Watermarking Techniques for DRM Applications

Alessandro Piva, Roberto Caldelli, Alessia De Rosa, Mauro Barni, Vito Cappellini
Copyright: © 2009 |Pages: 30
ISBN13: 9781605661186|ISBN10: 160566118X|ISBN13 Softcover: 9781616926236|EISBN13: 9781605661193
DOI: 10.4018/978-1-60566-118-6.ch004
Cite Chapter Cite Chapter

MLA

Piva, Alessandro, et al. "Watermarking Techniques for DRM Applications." Digital Rights Management for E-Commerce Systems, edited by Lambros Drossos, et al., IGI Global, 2009, pp. 71-100. https://doi.org/10.4018/978-1-60566-118-6.ch004

APA

Piva, A., Caldelli, R., De Rosa, A., Barni, M., & Cappellini, V. (2009). Watermarking Techniques for DRM Applications. In L. Drossos, D. Tsolis, S. Sioutas, & T. Papatheodorou (Eds.), Digital Rights Management for E-Commerce Systems (pp. 71-100). IGI Global. https://doi.org/10.4018/978-1-60566-118-6.ch004

Chicago

Piva, Alessandro, et al. "Watermarking Techniques for DRM Applications." In Digital Rights Management for E-Commerce Systems, edited by Lambros Drossos, et al., 71-100. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-118-6.ch004

Export Reference

Mendeley
Favorite

Abstract

The need to safeguard the property rights of multimedia content from unauthorized copying and the possibility to determine the true owners of the asset can be faced by resorting to efficient digital watermarking systems. This chapter presents a mathematical formulation to define a digital watermarking system and describes the general requirements to be satisfied, with more emphasis given to the aspects of security, robustness, and imperceptibility. After this general discussion, the two main classes of digital watermarking schemes, namely the spread-spectrum watermarking and the side-informed watermarking are explained by highlighting their main advantages and drawbacks. This analysis is completed by the description of a practical implementation of a digital image watermarking scheme. Finally, the use of watermarking systems in the framework of a DRM is deeply analyzed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.