Digital Watermarking on Multimedia Application
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
This paper incorporates the detail investigation of Digital watermarking clarification, idea and the principle commitments in this field, for example, classes of watermarking procedure that show which watermarking technique ought to be utilized. Advanced watermarking is the demonstration of concealing a message identified with a computerized flag( i.e., an image, song and video) within the flag itself. It is an idea firmly identified with steganography, in that they both shroud a message inside a computerized flag. Watermarking tries to conceal a message identified with the genuine substance of the computerized flag, while in steganography the advanced flag has no connection to the message, and it is only utilized as a cover to shroud its reality. So, in this paper we proposed an Effective Digital Watermarking Technique that we are applying in different Multimedia Application to ensure and secure our mixed media application. Also, this paper incorporates usage of a few watermarking calculations and inspects them in the terms of how they meet the necessities of various application and general prerequisites of watermarking.
Authors and Affiliations
Prof. Mayank Mangal, Rupali Vide, Madhuri Chande, Deepali Gaikar
Food Adulteration: A Review
Food is one of the basic needs for every living being and is very important aspect for life. But now a day’s foods are affected by different adulterants. Adulteration is a substance which reduces the vital importance of...
Performance investigation of axial flow compressor at different climatic conditions
This paper discusses the effect on axial-flow compressor, when climatic conditions are changing. Ensuring compressor run at maximum effectiveness is a primary aim for operators. In the existing economic climate, whateve...
Timely and Secure Data Transmission in Disruption Tolerant Networks
Disruption Tolerant Networks (DTNs) consist of mobile devices that contact each other opportunistically. In this paper, propose the original approach to support cooperative caching in DTNs, which enable the sharing and...
Distribution Line Fault Detection & GSM Module Based Fault Signaling System
Any distribution network is prone to faults, and intermittency in power availability creates loss for the supplier as well as user. Majorly, a supply line can be effected by conditions of overvoltage and overcurrent, al...
Design and Implementation of Secure System for Human Identification by Using Face and Gait Biometrics
In surveillance system, the identification of face and gait in video has received in sufficient attention. They have challenges in identification problems due to their large varying appearance and high complex pattern d...