A Review on Different Transform based Watermarking Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 4
Abstract
Over the past decades, watermarking plays a vital role in the branch of information hiding and it hides information in digital media. Watermarking is also used to prevent illegal usage as well as copyright protection or even source tracking. Along with the watermarking we can use the encryption for the extra protection of the images. To integrate both encryption and watermarking technology by the independence of and fusion of orthogonal decomposition, and for the comprehensive security protection of remote sensing images. In this paper we present a detailed survey of different existing watermarking algorithm and techniques for remote sensing image. We also discuss the issues and problems of each and every watermarking algorithm as a means for protecting copyrighted data. Hence this comparative study is not to examine the best algorithm, but to analyze the traditional techniques in order to help the researches to innovate more watermarking approaches in future.
Authors and Affiliations
Ms. M. Sharmila , Ms. P. Manju , Ms. P. S. Divya
Computer Aided Music Generation Using Genetic Algorithm and Its Potential Applications
Music speaks what cannot be expressed, soothes the mind and gives it rest, heals the heart and makes is whole. Not everyone is gifted with a good voice but almost everyone has good ears when it comes to pleasant music. T...
State Of The Art : Security In Wireless Body Area Networks
Advances in wireless communication technologies and sensors have scepter development of Wireless Body Area Network (WBAN). The wireless nature of network and sort of sensors provide various new, sensible and innovative a...
A Modeling Tool to Minimize the Expected Waiting Time of Call Center’s Customers with Optimized Utilization of Resources
In order to deliver assured Quality of Service (QoS) to the customer in terms of minimizing the expected waiting time in the queue; the service providers are putting a lot of effort. The varying calling pattern of the cu...
How Accountability Improves Software Reliability?
This paper encourage accountability as a principle for software reliability. There are various techniques to estimate software reliability which is tested. This paper treats to identify the faults which are put in the de...
A Scenario of Brain Computer Interaction with Different types of Face Recognition Techniques
Brain computer interaction technology has been developed to record the brain signal activity through various methods like Digital Electroencephalography, EMG , FMRI and face recognition. These are the advanced technology...