z-logo
open-access-imgOpen Access
WATERMARKING TECHNIQUES
Author(s) -
Man Kan Dan,
T. Meyappan
Publication year - 2012
Publication title -
international journal of computer and technology
Language(s) - English
Resource type - Journals
ISSN - 2277-3061
DOI - 10.24297/ijct.v2i3c.2709
Subject(s) - digital watermarking , computer science , authentication (law) , cryptography , computer security , focus (optics) , code (set theory) , identification (biology) , digital watermarking alliance , information hiding , embedding , database transaction , digital data , process (computing) , computer hardware , computer vision , database , image (mathematics) , artificial intelligence , operating system , data transmission , programming language , physics , botany , set (abstract data type) , optics , biology
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here