Essays about: "Watermarking"

Showing result 1 - 5 of 9 essays containing the word Watermarking.

  1. 1. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner

    University essay from KTH/Hälsoinformatik och logistik; KTH/Hälsoinformatik och logistik

    Author : Julius Andersson; David Engström; [2019]
    Keywords : Steganography; Steganalysis; Watermarking; Information hiding; Cryptography; Compression; Non-intrusive; Sturdy; JPEG; Steganografi; Steganalys; Vattenmärkning; Kryptografi; Kompression; Icke störande; Stabil; JPEG;

    Abstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE

  2. 2. A Buyer-Seller Protocol with Watermarking for Cloud Streaming : Towards an Ecosystem for Media Streaming

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Johan Björklund; [2017]
    Keywords : buyer-seller protocol; watermarking; blockchain;

    Abstract : This work shares purpose with new directions in the philosophy of intellectual property, where self-expression and participation in the creation of culture are seen as key ingredients of human wellbeingand autonomy. A technical solution is explored that enables major labels and independent creatorsto publish music with equal reach to audiences, without the need for trusted third parties. READ MORE

  3. 3. Watermarking Video Game Textures

    University essay from Blekinge Tekniska Högskola/Sektionen för ingenjörsvetenskap

    Author : Pedram Khoshdani; [2013]
    Keywords : watermarking; image; texture; dds; dxt; bc;

    Abstract : How amazing would it be to prevent illegal copies of computer games? Game developers work with the hope that they can make good profit out of their games, but when they know that they would not sell much they will be so disappointed and that is because once a few original copies of their games are released, soon or late, there will be illegal copies available in the market. Working on how to distinguish between a legal copy and an illegal copy is the general topic of this thesis. READ MORE

  4. 4. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE

  5. 5. Exploiting side information for audio watermarking: A sample system case study

    University essay from Chalmers tekniska högskola/Institutionen för signaler och system

    Author : Chandramouli Soorian; [2010]
    Keywords : ;

    Abstract : .... READ MORE