O'Reilly logo

Multimedia Security by Frank Y. Shih

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

5

Digital Watermarking Based on Chaotic Map and Reference Register

Yi-Ta Wu and Frank Y. Shih

CONTENTS

5.1    Introduction

5.2    Block-Based Chaotic Map

5.3    Reference Register

5.4    Proposed Watermarking Algorithm

5.5    Experimental Results

5.6    Conclusions

References

5.1    INTRODUCTION

Since multimedia technologies have been becoming increasingly sophisticated in the rapidly growing Internet applications, data security, including copyright protection and data integrity detection, has raised tremendous concerns. One solution to achieve data security is the digital watermarking technology that embeds hidden information or secret data in a host image (Berghel and O’Gorman, 1996; Eggers and Girod, 2002; Wu, 2005). It serves as a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required