Digital Watermarking on Multimedia Application
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
This paper incorporates the detail investigation of Digital watermarking clarification, idea and the principle commitments in this field, for example, classes of watermarking procedure that show which watermarking technique ought to be utilized. Advanced watermarking is the demonstration of concealing a message identified with a computerized flag( i.e., an image, song and video) within the flag itself. It is an idea firmly identified with steganography, in that they both shroud a message inside a computerized flag. Watermarking tries to conceal a message identified with the genuine substance of the computerized flag, while in steganography the advanced flag has no connection to the message, and it is only utilized as a cover to shroud its reality. So, in this paper we proposed an Effective Digital Watermarking Technique that we are applying in different Multimedia Application to ensure and secure our mixed media application. Also, this paper incorporates usage of a few watermarking calculations and inspects them in the terms of how they meet the necessities of various application and general prerequisites of watermarking.
Authors and Affiliations
Prof. Mayank Mangal, Rupali Vide, Madhuri Chande, Deepali Gaikar
Suggesting Pesticides for Farmers using Data Mining
Agriculture plays a vital role in India’s economy. Virtually fifty eight % of the rural people rely upon the Agriculture. One amongst the challenges that Indian farmers encounter nowadays is how to use the pesticides in...
An Incremental-And-Static-Combined Scheme for Matrix-Factorization-Based Collaborative Filtering
The last decade has witnessed a tremendous growth of Web services as a major technology for sharing data, computing resources, and programs on the Web. With increasing adoption and presence of Web services, designing no...
Enhanced authentication based security using TDES and MD5
For secure authentication over the internet and secure data transfer purposed using cryptography technique which provide high security. Encryption of an image, audio encryption, chaos based encryption contain various ap...
slugImpact of Information and Communication Technology in the Development of Network Services
A simple IP Subnet VLAN is implemented. By using implicit tagging, the problem related to packet tagging is removed. The distinction between hybrid port and trunk port is no longer important. Leaky VLAN i...
Technical Note- Study of Evapotranspiration for Pune District
the evapotranspiration is nothing but combined effect of evaporation and transpiration. The conversion of water into gaseous state with the help of sun heat is called evaporation. The process of loss of moisture from tr...