Watermarking: Some Best Practices
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
To protects intellectual property rights, the amount of exchanged digital content calls are rapidly growing based on efficient and practical techniques. During the past two decades, watermarking techniques have been presented to embed and detect information within such contents, with different four key requirements at hand, that are – capacity, invisibility, robustness, and security. So far, researchers mainly focused on the first three. Earlier work used novel DFT watermarking scheme featuring perceptually optimal visibility versus robustness. The system should possess good quality of images. With time goes new techniques are evolved with different quality features. Each system’s technique varies from one another. The techniques used, merits and demerits of different watermarking systems are studied and analyzed in this paper. We can get a detailed comparative study of different systems of watermarking.
Authors and Affiliations
Dinah C. Kurian, P. Damodharan
Analysis of Helical Spring of Two-Wheeler Suspension System Using Ansys Workbench 16.2
a helical spring is a mechanical device which is typically used to store energy and subsequently release it, to absorb shock, or to maintain a force between contracting surface. They are made of an elastic material form...
A survey of cooperative blackhole attack in mobile ad hoc networks
A MANET is an infrastructure less network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate with each other in order to...
Visual Surveillance Using Absolute Difference Motion Detection System
Continuous Surveillance is closed observance or monitoring of unusual behaviour or any other activities. As security is becoming the major concern of society and hence having a security system is highly essential. Video...
A Graphical User Interface Implementation of Second Order Sigma- Delta Analog to Digital Converter with Improved Performance Parameters
Analog to Digital Converters are widely used in the field of VLSI and are mainly used in the applications like audio, instrumentation, seismic, voice etc which requires higher value of resolution. For such applications,...
Artificial Neural Network for Development of Intrusion Detection System
In this digital age, information security is very challenging task to protect the information from suspicious person. All word has to become digital and information is been store in digital format. Today, there is great...