Watermarking: Some Best Practices
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
To protects intellectual property rights, the amount of exchanged digital content calls are rapidly growing based on efficient and practical techniques. During the past two decades, watermarking techniques have been presented to embed and detect information within such contents, with different four key requirements at hand, that are – capacity, invisibility, robustness, and security. So far, researchers mainly focused on the first three. Earlier work used novel DFT watermarking scheme featuring perceptually optimal visibility versus robustness. The system should possess good quality of images. With time goes new techniques are evolved with different quality features. Each system’s technique varies from one another. The techniques used, merits and demerits of different watermarking systems are studied and analyzed in this paper. We can get a detailed comparative study of different systems of watermarking.
Authors and Affiliations
Dinah C. Kurian, P. Damodharan
slugMaintaining Data Security In Privacy Preserving Association Rule Mining
This paper is based on the various data mining techniques which are used to detect some unwanted transaction in data base. Our approach concentrates on mining data dependencies among data items in the database. A data d...
Implementation of Electronic Nose with TGS Gas Sensors
Nowadays, requirements for detecting fresh milk from farms are restricted by traditional testing methods and expensive imported detecting instruments, which is going against the improvement of fresh milk’s quality. The...
Computer networks Considerations When Choosing a Topology
Instantly sending messages across the world has represented something new and extraordinary in the world of computer networks. Instant messaging saw the increase in usage of 'text language' and emoticons which served as...
Experimental Analysis of Fingerprint Recognition System
The objective of this paper is to analyze the fingerprint verification techniques by extracting the features of fingerprints and enhance the fingerprint using image processing techniques to improve the matching percenta...
Design, Construction and Structure Analysis of Twinrotor UAV
There have been much advancement in the field of aerospace and avionics. Scientists have increasingly started to focus on VTOL (vertical take - off and landing) aircrafts. We have built a miniature VTOL twinrotor UAV. U...