Professional Documents
Culture Documents
Tutorial 8 (Lecture 8) : TDW3431 Digital Watermarking Trimester 1, 2014/2015
Tutorial 8 (Lecture 8) : TDW3431 Digital Watermarking Trimester 1, 2014/2015
Tutorial 8 (Lecture 8) : TDW3431 Digital Watermarking Trimester 1, 2014/2015
Tutorial 8
(Lecture 8)
4. Briefly describe the THREE basic approaches used for selective authentication.
6. Briefly describe the TWO basic restoration strategies: exact restoration and approximation
restoration.
7. Differentiate the following restoration approaches: embedded redundancy, self-embedding, and blind
restoration.