Entry
Reader's guide
Entries A-Z
Subject index
Digital Watermarking
This entry discusses one category of information hiding techniques: digital watermarking and its applications in solving commercial problems caused due to unauthorized sharing of digital media via the Internet. Specifically, this entry introduces two different technologies that form part of digital watermarking: (1) robust watermarking and (2) fragile watermarking. These techniques address information piracy, copyright protection, tamper detection, traitor tracing, and ownership verification. These issues have become a major concern with the adoption of the Internet, where people regularly share digital content in the form of music, videos, and television shows. On most occasions when we purchase a digital copy of music or video, we are bound by the license terms that prohibit us from sharing or making digital copies of the media. This entry ...
- Criminal and Ethical Facets
- Economic Facets
- Adware
- Agriculture and the Internet
- Alibaba
- Amazon
- Back Offices, Call Centers, and the Internet
- Bitcoin
- Blockchain
- Broadband Internet Affordability
- Crowdfunding
- Cryptocurrencies
- eBay
- e-Commerce: Business-to-Business
- e-Commerce: Business-to-Consumer
- e-Commerce: Business-to-Government
- Economic Development and the Internet
- Energy Use and the Internet
- e-Tailing
- Fiber Optics and the Internet
- Internet Advertising
- Internet Banking
- Internet Recruiting
- Internet Taxation
- Location-Based Services
- Manufacturing and the Internet
- MercadoLibre
- PayPal
- Rural Areas and the Internet
- Sharing Economy and the Internet
- Smart Cities
- Smart Energy Systems
- Smart Grids
- Telework
- Tourism and the Internet
- Transportation and the Internet
- Virtual Teams
- Webinars
- Internet History and Governance
- Declaration of the Independence of Cyberspace
- ARPANET
- BITNET
- Cyclades
- Deep Packet Inspection
- Electronic Frontier Foundation
- Gopher
- Internet Architecture Board
- Internet Assigned Numbers Authority
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Governance
- Internet Origins and History
- Internet Society
- Internet Standards
- NSFNET
- Usenet
- WELL, The
- World Wide Web
- World Wide Web Consortium
- Political and Legal Facets
- Anonymous
- Biometrics
- Clicktivism
- Cyberespionage
- Cybersecurity
- Cyberwarfare
- Distributed Denial-of-Service Attack
- e-Government
- Elections and the Internet
- Electronic Signatures
- Geoblocking
- Great Firewall
- Internet Activism
- Internet Censorship
- Internet Law
- Internet Surveillance
- m-Government
- Military Internet
- National Security Agency Surveillance
- Net Neutrality
- Right to Be Forgotten
- Right to Internet Access
- Slacktivism
- Social Movements and the Internet
- Stuxnet
- WikiLeaks
- Social, Behavioral, and Psychological Facets
- Augmented Reality
- Baidu
- Blind People and the Internet
- Blogs
- Chat Rooms
- Children, Adolescents, and the Internet
- Citizen Science
- Crowdsourcing
- Cybercafés
- Cyberoptimism and Cyberpessimism
- Cyberwellness
- Diasporas and the Internet
- Digital Divides, Disability and
- Digital Divides, Ethnicity and
- Digital Divides, Gender and
- Digital Divides, Geography of
- Digital Divides, Global
- Digital Divides, Language and
- Digital Earth
- Digital Humanities
- Digital Natives
- Education and the Internet: Colleges and Universities
- Education and the Internet: Elementary and Secondary Schools
- e-Health
- Elderly People and the Internet
- Electronic Literature
- Emojis and Emoticons
- Ethnographic Research and the Internet
- Google Earth
- Health Care and the Internet
- Internet Addiction
- Internet Dating
- Internet Gambling
- Internet Gaming
- Internet Mapping
- Internet Memes
- Internet Movie Database
- Internet Nonusers
- Internet Pornography
- Internet Privacy
- Internet Slang
- Internet Telephony
- iPhones
- Journalism and the Internet
- Libraries and the Internet
- Massive Open Online Courses
- Microblogs
- Mobile Internet
- Municipal Broadband
- Music and the Internet
- Myspace
- Neogeography
- Netflix
- Netiquette
- Netizen
- One Laptop per Child
- Online Social Networks
- Photo Sharing Applications
- Podcasting
- Project Loon
- Religion and the Internet
- Sexting
- Skype
- Smartphone Apps
- Smartphones
- Social Media
- Sports and the Internet
- Telecenters
- Telemedicine
- Television and the Internet
- Tencent
- Texting
- Tor
- Video Games and the Internet
- Virtual Reality
- Wearable Technologies
- Web 2.0
- Wi-Fi
- Wikipedia
- Yahoo
- YouTube
- Technical Facets
- AI Safety
- Algorithmic Selection on the Internet
- Broadband Internet
- CAPTCHA
- Cloud Computing
- Cookies
- Cyberinfrastructure
- Cyberspace
- Cybersquatting
- Deep Web
- Digital Steganography
- Digital Watermarking
- Domain Name
- Domain Name System
- Electronic Mailing Lists
- Ethernet
- File Sharing
- File Transfer Protocol
- Firewalls
- Freenet
- Geoweb
- Hashtag
- Hyperlink
- Hypertext Markup Language
- Hypertext Transfer Protocol
- Internet Backbone Networks
- Internet Connectivity
- Internet Data Centers
- Internet GIS
- Internet of Things
- Internet Routing
- Internet Service Providers
- IP Addresses
- Local Area Networks
- Packet Switching
- Peer-to-Peer Networks
- Satellite Internet
- Search Engine
- Semantic Web
- TCP/IP
- Traceroute
- Uniform Resource Locator
- Virtual Private Networks
- Volunteered Geographic Information
- Web Browsers
- Web Design
- Web GIS
- Web Mining
- Web Programming
- Webometrics
- Website and Webpage
- Wide Area Networks
- Loading...