Sie sind auf Seite 1von 1

TDW3431 Digital Watermarking Trimester 1, 2014/2015

Tutorial 2
(Lecture 2)

1. What are the important attributes of watermarking over other related techniques?

2. Describe the following watermarking applications using your own words: broadcast monitoring,
owner identification, proof on ownership, transaction tracking, content authentication, copy control.

3. Describe the interaction of encryption, record control and playback control according to the figure
shown below.

4. Discuss the major limitation of textual copyright notices in owner identification of a work with an
appropriate example.

5. Explain the following watermarking terminologies: fidelity, data payload, false positive rate,
robustness, security.

6. Differentiate informed detections from blind detections.

7. Explain the categories of hostile attacks.

8. Discuss the problems if the security of a cryptographic algorithm relies on keeping the algorithm
secret.

9. Give the specifications of key-based cryptographic and watermarking systems.

Das könnte Ihnen auch gefallen