watermarking and fingerprints in digital fromat ( like doc or txt files or databases )

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

I need to explain in details:

- watermarking and fingerprints in digital fromat ( like doc or txt files or databases )

Expert Solution
Basics
  • The Internet and other computerized media have revolutionized the manner in which we impart, presenting us all to an unheard of volume of thoughts and conceivable outcomes. The new advancements likewise offer the obscurity which builds the opportunity that people will face challenges and investe with conduct they may never endeavor, "all things considered".
  • Note that copyright secures the manner in which a thought is introduced, as opposed to a thought itself; for example in the event that it is resolved to paper or other bit of media.
  • In the event that you have an unique thought or bit of imaginative work, regardless of what others may state, it's as yet an expected resource and ought to be treated important. Your work can wind up having significant incentives later on and can even possibly be utilized for budgetary guarantee.
Watermarking
  • It is utilization of a sort of marker covertly installed in an advanced media, for example, sound, video or picture which empowers us to know the source or proprietor of the copyright. This procedure is utilized for following copyright encroachment in online media and knowing the validity of the notes in the banking framework.

Computer Science homework question answer, step 2, image 1

  • Sorts of Watermarks :
    • Visible Watermarks – These watermarks can be seen.
    • Imperceptible Watermarks – These watermarks are inserted in the media and use stenography procedure. They are not noticeable by unaided eyes.
    • Public Watermarks – These can be perceived and changed by anybody utilizing certain calculations. These are not secure.
    • Delicate Watermarks – These watermarks are wrecked by information manipulation. There must be a framework which can recognize all adjustments in the information if delicate watermarks are to be utilized.
  • It is a safe method. The inserting of watermarks is finished by a key. Any individual who needs to eliminate the watermark can just do this with the information on the keys associated with installing.
steps

Step by step

Solved in 3 steps with 1 images

Blurred answer
Knowledge Booster
Types of Database
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education