WATERMARKING TECHNIQUES
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2012, Vol 2, Issue 3
Abstract
Embedding a hidden stream of bits in a file is called Digital watermarking. The file could be an image, audio, video or text. Nowadays, a digital watermarking has many applications such as broadcast monitoring, owner identification, proof of ownership, transaction tracking, content authentication, copy control, device control and file reconstruction. It is intended to complement cryptographic processes. It is a visible or preferably invisible, identification code that is permanently embedded in the data and remains present within the data after any decryption process. The focus of this paper will detail digital watermarking for multimedia applications and covered by definition of digital watermarking, purpose, techniques and types of watermarking attacks briefly discussed.
Authors and Affiliations
Man Kan Dan, Dr. T. Meyappan
An Evaluation of Topology Effect on Tiny Service Discovery Protocol for Wireless Sensor Networks
In the literature of wireless sensor networks (WSNs), a well studied problem is that of achieving full sevice discovery within a region according to the topology model of coverage. A large waiting time of wireless sensor...
Privacy Preserving Data Mining using Attribute Encryption and Data Perturbation
Data mining is a very active research area that deals with the extraction of  knowledge from very large databases. Data mining has made knowledge extraction and decision making easy. The extracted knowledge could reveal...
A Study on Surface Roughness and Cutting Width for Circular Contour Machining of Stir Cast AA6063/SiC Composites in WEDM
Wire electrical discharge machining is used in machining electric conductive materials with intricate shapes and profiles. This paper presents an experimental investigation on the influence of cutting conditions of WEDM...
Logistics Innovation in the Medico-Social Sector: An Optimized Workflow for an Efficient Patient Care
The issue of care for the elderly is a real challenge for our society. The French government offers solutions to users, particularly through institutions hosting for dependent elderly people (nursing homes). We position...
A Survey of Wireless Sensor Network Routing Protocols based on SPIN
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some...