Coefficient modifying of video watermark
A technology of coefficients and coefficient sets, applied in the field of embedding and detecting watermarks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] Several applications require real-time watermark embedding, such as session-based watermark embedding for set-top boxes and for digital cinema servers (or called media blocks) or projectors. Although fairly obvious, it is worth mentioning that this renderer has difficulty applying the watermarking method, ie using frames arriving later in time at a given time. Preferably, offline precomputation (eg of watermark position or strength) should be avoided. There are several reasons, but two are most important: potential security breach (if an attacker knows the full details of the embedding algorithm, current algorithms for generating watermarks are generally less secure) and impracticality.
[0034] In most applications, a unit of digitally watermarked content usually undergoes some modification between embedding and detection. These modifications are called 'attacks' because they usually degrade the watermark and make detection more difficult. An attack is considered 'un...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 