Evaluation of Watermarking Techniques

Journal Title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 2

Abstract

 Now a days the copyright of multimedia and secrete information is very difficult to transfer across the internet multimedia objects must be compressed before transmitting the data. The JPEG compression is one of the most important criteria in watermarking issue. Watermarking, which belong to the information hiding technique? There is a lot of work begin conducted in different branches in this field,Stegnography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. We classify the techniques based on different domains in which data is embedded. Here we limit the survey to images only. However, making digital data accessible to others through networks also creates opportunities for malicious parties to make sailable copies of copyrighted content without permission of the content owner. Digital watermarking techniques have been proposed as a solution to the problem of copyright protection of multimedia data in network environments.

Authors and Affiliations

Dr. A. S. N. Chakravarthy#1 , Prof. S. BALAJI *2 , Rammohanarao Koduri #

Keywords

Related Articles

An Inventory Model for Time Varying Holding Cost and Weibull Distribution for Deterioration with Fully Backlogged Shortages

To find optimum order quantity deterioration plays crucial role in inventory management therefore handling of deterioration is in highlight and attracted of many researchers. In this model Economic Production P roblem u...

Separation Axioms in Intuitionistic Fuzzy Soft Topological space

In this paper, I have studied some properties of fuzzy soft topological space. We define fuzzy soft intuitionistic separation axioms and basic definition of intuitionistic fuzzy soft normal spaces and theorems. Lastly, i...

Near Meanness on Special Types of Graphs

The graph that admits a near mean labeling is called a near mean graph (NMG). In this paper, we proved that the graphs Special types of graphs Triangular snake, Quadrilateral snake, , Sm,3, Sm,4 and Parachutes are near m...

Pulsatile Flow of Blood with Volume Fraction of Micro-organisms in the Presence of Transverse Magnetic Field through Stenosed Tube

This paper presents an analytical study of pulsatile flow of blood with micro-organisms through stenosed tubes in presence of transverse magnetic field.The effect of externally applied magnetic field on velocity, flow ra...

Common Fixed Points for Generalized Weakly Contractive Mappings in G-Metric Spaces

The existence of points of coincidence and common fixed points for a pair of self mappings satisfying generalized weakly contractive conditions in -metric spaces is proved. Our results are generalization and extension of...

Download PDF file
  • EP ID EP87286
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Dr. A. S. N. Chakravarthy#1, Prof. S. BALAJI *2, Rammohanarao Koduri # (2012).  Evaluation of Watermarking Techniques. INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY, 3(2), 82-85. https://europub.co.uk/articles/-A-87286