Tutorial 8 (Lecture 8) : TDW3431 Digital Watermarking Trimester 1, 2014/2015

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

TDW3431 Digital Watermarking Trimester 1, 2014/2015

Tutorial 8
(Lecture 8)

1. Compare exact authentication to selective authentication.

2. Briefly describe the TWO basic methods for exact authentication.

3. What is an erasable watermark? Describe the steps of generating an erasable watermark.

4. Briefly describe the THREE basic approaches used for selective authentication.

5. Define localization. Discuss whether localization is useful in content authentication.

6. Briefly describe the TWO basic restoration strategies: exact restoration and approximation
restoration.

7. Differentiate the following restoration approaches: embedded redundancy, self-embedding, and blind
restoration.

You might also like