(redirected from watermarked)
Also found in: Dictionary, Thesaurus, Financial, Acronyms.


see paperpaper,
thin, flat sheet or tissue made usually from plant fiber but also from rags and other fibrous materials. It is used principally for printing and writing on but has many other applications. The term also includes various types of paperboard, such as cardboard and wallboard.
..... Click the link for more information.



a picture in a piece of paper, visible when the paper is held up to the light; it is formed during the process of making the paper.

Watermarks began to appear in Europe in the 13th century, and in Russia in the second half of the 17th century. The study of watermarks and the determination of the exact place and time of the making of a piece of paper are very important for the correct interpretation of a source.

Since 1723, Russia, following the example of other European countries, impressed watermarks on stamped paper (a depiction of the state coat of arms and the words“stamped paper”) in order to avoid counterfeiting of official documents and currency. Watermarks are usually made on paper at precise intervals, or they cover the whole field of the paper in the form of a repeated drawing or pattern. They can be used to distinguish genuine money, valuable papers and documents, and stamps from counterfeit items. Watermarks are also used as a means of ornamenting paper. The imprinting of watermarks is usually done with a dandy roll or with cylinders of a cylinder paper-making machine on a wet web of the paper.



(graphic arts)
A localized modification of the structure and opacity of a sheet of paper so that a pattern or design can be seen when the sheet is held to the light.

digital watermark

A pattern of bits embedded into a file that is used to identify the source of illegal copies. For example, if a digital watermark is placed into a master copy of an audio CD or DVD movie, then all copies of that disc are uniquely identified. If a licensee were to manufacture and distribute them in areas outside of their authorized territories, the watermark provides a trace.

The watermark developer has to find creative ways of altering the file without disturbing it for the user. It is difficult to embed a watermark within an ASCII file, which is just raw text. However, it is relatively easy to alter a few bits within audio, video and image formats without making a noticeable difference on playback or display.

WinZip's Watermark Function
The popular WinZip utility performs numerous functions beyond simply encrypting a file. This is the dialog showing options for adding a digital watermark to certain image files. See WinZip.
References in periodicals archive ?
Obtain the watermarked image [I.sub.W] by performing the inverse DWT using [B.sub.2] and three sets of DWT coefficients: [HL.sub.2], [B.sub.1] and [HH.sub.2].The detailed process of watermark embedding is illustrated in the figure 3.
They have assumed watermarked consists of 0's and 1's all bits of the watermark are embedded into host image.
The transparency evaluation is carried out by calculating the peak signal to noise ratio (PSNR) between the host image and the watermarked colour image that is given in decibels (db).
The Peak-Signal-to-Noise Ratio between the original I(t) and the attacked watermarked J(t) signals is calculated using (1) and (2).
Extracting the watermark requires both the original and the watermarked images.
Generally, watermarked text documents are shared via communication channels such as web, email, or social media over the Internet.
x represents the real parts of the DT-CWT coefficients, whereas [??] denotes the watermarked coefficients.
With Irdeto TraceMark now supporting J2K in IMF, content owners are able to keep one master version of the content and send out individually watermarked versions of the content on-the-fly with no delay to distributors, the release stated.
where "C" is regarded as the correlation between the embedded watermark and the most prominent coefficient of the attacked watermarked and "CK" is the correlation between Kth random
Transmission of an encrypted message may create suspense for an intruder, whereas this is not a case with a stego or watermarked message in a cover signal.