AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 1
Abstract
The rapid expansion of the Internet has rapidly increased the availability of digital data such as audio, images and videos to the public and file sharing has become very convenient. As such, the problem of protecting multimedia information, the issues of copyright has gained interest of researchers. Owners are concerned about protecting any illegal duplication of their data or work. Protection of intellectual property is very important because digital multimedia content can be copied and distributed quickly, easily, inexpensively, and with high quality and precision. Watermarking has been accepted as a complementary technology to multimedia encryption, providing some additional level of protection of intellectual property rights. Here we present, an overview of digital watermarking and the range of applications that could benefit from applying digital watermarking technology. We propose a simple algorithm for watermarking of an image where it is implemented through Matlab 7.4. The algorithm enables the basic requirements of watermarking and there is future scope to incorporate additional security and robust natures.
Authors and Affiliations
Jahnvi Sen , A. M. Sen , K. Hemachandran
REACTIVE MULTIHOP ROUTING WITH MCDS IN MANETS
A wireless ad hoc network is a special type of network in which a collection of mobile nodes with wireless network interfaces may form a temporary network, without support of any fixed infrastructure or centralized contr...
SURVEY ON HEURISTICS BASED RESOURCE SCHEDULING IN GRID COMPUTING
The most important goal of the Resource Scheduling in Grid Computing is to efficiently map the jobs to resources. Resource Scheduling in Grid computing is a complex task because of the heterogeneous environment. Grid Sch...
NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC
IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts...
Design of JK Flip-Flop using MODFET Technology
The pertinent choice of flip-flop topologies is an essential importance in the design of VLSI integrated circuits for high speed and high performance MODFET circuits. Understanding the suitability of flipflops and select...
PREDICTION OF RAINFALL USING DATAMINING TECHNIQUE OVER ASSAM
Meteorological data mining is a form of data mining concerned with finding hidden patterns inside largely available meteorological data, so that the information retrieved can be transformed into usable knowledge. Weather...