摘要:
The ability to remove a watermark from an encoded image opens the possibility of various novel applications. Several such applications are detailed. One employs a reversible watermark in conjunction with a second (robust) watermark. In this arrangement, the payload of the reversible watermark conveys information about the robust watermark (e.g., encoding parameters, or an error signal), permitting removal of the robust watermark from an uncorrupted encoded image. By such arrangements, the encoded image can be fully restored to its pristine, unencoded state even if several different watermarks have been applied.
摘要:
The ability to remove a watermark from encoded content (e.g., an image) opens the possibility of various novel applications. Several such applications are detailed. One employs a reversible watermark in conjunction with a second (robust) watermark. In this arrangement, the payload of the reversible watermark conveys information about the robust watermark (e.g., encoding parameters, or an error signal), permitting removal of the robust watermark from an uncorrupted encoded image. By such arrangements, the encoded image can be fully restored to its pristine, unencoded state even if several different watermarks have been applied.
摘要:
The ability to remove a watermark from an encoded image opens the possibility of various novel applications. Several such applications are detailed. One employs a reversible watermark in conjunction with a second (robust) watermark. In this arrangement, the payload of the reversible watermark conveys information about the robust watermark (e.g., encoding parameters, or an error signal), permitting removal of the robust watermark from an uncorrupted encoded image. By such arrangements, the encoded image can be fully restored to its pristine, unencoded state even if several different watermarks have been applied.
摘要:
The ability to remove a watermark from an encoded image opens the possibility of various novel applications. Several such applications are detailed. One employs a reversible watermark in conjunction with a second (robust) watermark. In this arrangement, the payload of the reversible watermark conveys information about the robust watermark (e.g., encoding parameters, or an error signal), permitting removal of the robust watermark from an uncorrupted encoded image. By such arrangements, the encoded image can be fully restored to its pristine, unencoded state even if several different watermarks have been applied.
摘要:
The ability to remove a watermark from an encoded image by reversible watermarking opens the possibility of various novel applications. Several such applications are detailed. One permits different classes of consumers to gain access to different versions of an image. A pristine image is intentionally degraded in some fashion, and distributed to consumers. By reference to one or more watermarks in the degraded image, some or all of the degradation can be removed, or transformed to a less-objectionable state. Through such arrangements, image consumers with different needs can gain access to versions of the image having differing qualities.
摘要:
Reversible watermarking methods enable auxiliary data to be embedded in data sets, such as images, audio, video and software. The reversible nature of the method enables the original data set to be perfectly restored. Control systems with feedback loops are used to optimize embedding based on distortion or auxiliary data capacity constraints. The watermarking may be applied recursively to embed several layers, where subsequent layers are embedded into a previously watermarked data set. To recover the original data, each layer is extracted and the data restored in reverse order of the embedding. Sets of elements that are expanded to carry auxiliary data in each layer overlap or are interleaved to maximize embedding capacity or quality of the host data.
摘要:
Reversible watermarking methods enable auxiliary data to be embedded in data sets, such as images, audio, video and software. The reversible nature of the method enables the original data set to be perfectly restored. Control systems with feedback loops are used to optimize embedding based on distortion or auxiliary data capacity constraints. The watermarking may be applied recursively to embed several layers, where subsequent layers are embedded into a previously watermarked data set. To recover the original data, each layer is extracted and the data restored in reverse order of the embedding. Sets of elements that are expanded to carry auxiliary data in each layer overlap or are interleaved to maximize embedding capacity or quality of the host data.
摘要:
The ability to remove a watermark from an encoded image by reversible watermarking opens the possibility of various novel applications. Several such applications are detailed. One permits different classes of consumers to gain access to different versions of an image. A pristine image is intentionally degraded in some fashion, and distributed to consumers. By reference to one or more watermarks in the degraded image, some or all of the degradation can be removed, or transformed to a less-objectionable state. Through such arrangements, image consumers with different needs can gain access to versions of the image having differing qualities.
摘要:
The ability to remove a watermark from encoded content (e.g., an image) opens the possibility of various novel applications. Several such applications are detailed. One employs a reversible watermark in conjunction with a second (robust) watermark. In this arrangement, the payload of the reversible watermark conveys information about the robust watermark (e.g., encoding parameters, or an error signal), permitting removal of the robust watermark from an uncorrupted encoded image. By such arrangements, the encoded image can be fully restored to its pristine, unencoded state even if several different watermarks have been applied.
摘要:
The ability to remove a watermark from an encoded image by reversible watermarking opens the possibility of various novel applications. Several such applications are detailed. One permits different classes of consumers to gain access to different versions of an image. A pristine image is intentionally degraded in some fashion, and distributed to consumers. By reference to one or more watermarks in the degraded image, some or all of the degradation can be removed, or transformed to a less-objectionable state. Through such arrangements, image consumers with different needs can gain access to versions of the image having differing qualities.