A Review on Different Transform based Watermarking Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 4
Abstract
Over the past decades, watermarking plays a vital role in the branch of information hiding and it hides information in digital media. Watermarking is also used to prevent illegal usage as well as copyright protection or even source tracking. Along with the watermarking we can use the encryption for the extra protection of the images. To integrate both encryption and watermarking technology by the independence of and fusion of orthogonal decomposition, and for the comprehensive security protection of remote sensing images. In this paper we present a detailed survey of different existing watermarking algorithm and techniques for remote sensing image. We also discuss the issues and problems of each and every watermarking algorithm as a means for protecting copyrighted data. Hence this comparative study is not to examine the best algorithm, but to analyze the traditional techniques in order to help the researches to innovate more watermarking approaches in future.
Authors and Affiliations
Ms. M. Sharmila , Ms. P. Manju , Ms. P. S. Divya
An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks
Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components . Thus , the planning of mobile components , i.e. , however they traverse through the sensing field and...
Capacity Analysis of MIMO Hydrophone in Underwater Acoustic Communication
Underwater acoustic communication is a technique of sending and receiving message below water. There are several ways of employing such communication but the most common is using hydrophones. A hydrophone is a microphone...
TDB Based Optimistic RSUs Deployment in VANETs
Now–a–days Vehicular Ad Hoc Networks (VANETs) has attracted the attention of both the industry and academia. Roadside units (RSUs) are one of the fundamental components of Vehicular ad hoc network (VANET). VANET comprise...
4G User Acceptance Technology Prediction using Grey Prediction Algorithm
The main objective in this study is to prediction of 4G user acceptance in India. Mobile technologies bring more benefits to users when more people use it in the network. This research will show the adoption intentions o...
A distributed system architecture for maximum utilization of idle resources and speedup for batch processing tasks.
Computers which are used in organizations for normal task, may have wastage of resources like processing power, memory (mainly primary memory). If computers are used as a single unit, even then some amount of resources a...