Sie sind auf Seite 1von 1

TDW3431 Digital Watermarking Trimester 1, 2014/2015

Tutorial 8
(Lecture 8)

1. Compare exact authentication to selective authentication.

2. Briefly describe the TWO basic methods for exact authentication.

3. What is an erasable watermark? Describe the steps of generating an erasable watermark.

4. Briefly describe the THREE basic approaches used for selective authentication.

5. Define localization. Discuss whether localization is useful in content authentication.

6. Briefly describe the TWO basic restoration strategies: exact restoration and approximation
restoration.

7. Differentiate the following restoration approaches: embedded redundancy, self-embedding, and blind
restoration.

Das könnte Ihnen auch gefallen