Watermarking–A Novel Approach
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2014, Vol 4, Issue 1
Abstract
The major growth of information technology is based on the growth of computer networks. The computer network diminished the entire global in a nutshell, via the internet and the intranet capabilities. In the recent year, communicating information within authenticated groups in the text, image and video formats are highly unavoidable one. And in the same manner, there are more possibility that the communicated information to be hacked by the anonymous hacker. The hacker may be passive or active; it is highly risk for many engineering applications like military network. Hence, digital watermarking is merged to rectify the above pitfalls. Watermarking techniques developed for images are mainly classified into visible and invisible approaches. The study further analyses the modern digital watermarking system.
Authors and Affiliations
Y. Arockia Raj , V. Priya
Energy Efficiency QoS Assurance Routing in Wireless Multimedia Content Deliver Network
The problem of low penetration of multicast and QoS enabling mechanisms in IP networks, overlay network techniques are used that avoid undue duplication of Multimedia streaming flows while transcoding or scalable encodin...
Towards Instructional Design of Ubiquitous Learning Environments
A remarkable shift of what technologies may offer particularly mobile, wireless and sensor-based ones, i. e. a SF like environment in which ubiquitous and pervasive technologies provide for opportunities only imagi...
Packet Mark Methodology for Reduce the Congestion in the Network by using the Code Field in the TCP/IP header
Congestion is one of the major problems of a communication network in routing. The function of a routing is to guide packets through the communication network to their correct destinations. Every router receives the pack...
Intrusion Detection System Using Fuzzy Inference System
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access or denial of a computer network and network accessible resources. Intrusions are the...
FPGA based implementation of Interoperability of Wireless mesh Network and Wi-Fi
Wireless Mesh Networks (WMNs) is a key technology for next generation wireless networks, showing rapid progress and many new inspiring applications. IEEE 802.11s is the standard defined for WLAN mesh networks.One importa...