z-logo
open-access-imgOpen Access
Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection
Author(s) -
Neha Janu,
Ankit Kumar,
Pankaj Dadheech,
Gajanand Sharma,
Ashutosh Kumar,
Linesh Raja
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1131/1/012020
Subject(s) - digital watermarking , watermark , computer science , computer security , authentication (law) , digital watermarking alliance , image (mathematics) , multimedia , computer vision
Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can also be used to deter unauthorized recording equipment. Another application is the watermark copyright control, which works at stopping the creator of the image from stealing photos unlawfully. A watermark is a promising option for the copyright transcendence of multi-media files, as embedded messages are still included. Due to the limits of fidelity, a watermark may be implemented in a small multimedia data space. There is no proof that Automated Watermarking technologies will fulfil the ultimate purpose of the cleaners of all sorts of copyright security operations to gather knowledge from the data they obtain. Relevant situations may be deemed more fairly expected with the usage of automated copyright marking technologies. A perfect device will not be able to add a digital watermark without the limit, which does not supply the whole object with details. In this work, a modern technique for watermarking includes injecting two or more messages or photographs into a single picture for protection purposes and repeating a similar procedure for N-frames for authentication in the film.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here