DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES
Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 4
Abstract
This paper presents digital watermarking methods for authorization against copying or piracy of color images. Watermarking is a very important field for copyrights of various electronic documents and media. With images widely available on the Internet, it may sometimes be desirable to use watermarks. Digital watermarking is the processing of combined information into a digital signal. A watermark is a secondary image, which is overlaid on the host image, and provides a means of protecting the image. This paper presents the survey on digital watermark features, its classifications and applications. Various watermarking techniques have been studied in detail in mainly three domains: spatial, frequency and statistical domain. In spatial domain, Least-Significant Bit (LSB), SSM-Modulation-Based Technique has been developed. For DCT domain, block based approach and for wavelet domain, multi-level wavelet transformation technique and CDMA based approaches has been developed. The Discrete Wavelet Transform (DWT) is currently used in a wide variety of signal processing applications. This paper also presents the various error matrices for analyses the robustness of watermarking method.
Authors and Affiliations
Keshav S Rawat , Dheerendra S Tomar
ON ROAD VEHICLE/OBJECT DETECTION AND TRACKING USING TEMPLATE
Vehicle tracking and detection plays an important role in traffic surveillance, still a crucial task in many applications. Till now, there is no standard method developed. Template matching is one of the methods used for...
AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION
The rapid expansion of the Internet has rapidly increased the availability of digital data such as audio, images and videos to the public and file sharing has become very convenient. As such, the problem of protecting mu...
Load and Energy Consumption based Scheduling Algorithm for Wireless Sensor Networks (LECSA)
Sleep/Wake up scheduling for Wireless Sensor Networks has become an essential part for its working. In this paper, the Low Energy Adaptive Clustering Hierarchy (LEACH) which introduced the concept of clustering in sensor...
A SURVEY ON FACE DETECTIONMETHODS AND FEATURE EXTRACTION OF FACE RECOGNITION USING PCA
From the most recent two decades, face acknowledgment is playing a vital and basic part particularly in the field of business, managing an account, social and law requirement region. It is an intriguing utilization of ex...
SPURIOUS POWER SUPPRESSION TECHNIQUE FOR VLSI ARCHITECTURE
Using spurious power suppression technique (SPST) in VLSI will reduce the power consumption of the system significantly. Here we are going to implement this design in Infinite Impulse Response (IIR) and Finite Impulse Re...