Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

TDW3431 Digital Watermarking Trimester 1, 2014/2015

Tutorial 6
(Lecture 6)

1. Distinguish robust watermarks from secure watermarks. Elaborate the main reason why
watermark robustness is a necessary property if a watermark is to be secure.

2. Briefly describe the common approaches that can be used to make watermarks robust.

3. Give TWO characteristics of spread spectrum communications that are important to watermarking.

4. How do we decide which coefficients of a work’s representation are reliable, and which are not?

5. Do you agree that it is inappropriate to embed a watermark in all coefficients of a work’s


representation? Elaborate your answer.

6. Suggest a way that can be used to embed watermark in the coefficients of known robustness. Explain
your answer.

7. Many processes can be either exactly or approximately inverted. Identify the major difficulty of
inverting distortions in the watermark detector.

8. Explain the embedding process for inserting a pre-distorted watermark using a diagram.

You might also like