DIGITAL WATERMARKING: A SURVEY
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 9
Abstract
This is the era of digital information as digital image plays a vital role in every field of human lives. A digital image is both informative and flexible since it is easy to edit and redistribute. The vulnerability of digital image increases along with its use. So the security and confidentiality need to be maintained. Digital watermarking is the technique that provides security to the digital image where a low energy signal (watermark) is embedded in the original signal (host) to make the host imperceptible. The host signal may be any form of digital multimedia data like image, audio or video. When the watermarking technique is performed on the host signal, it becomes free from unauthorised access and can only be detected or extracted as required by the authorised receiver.
Authors and Affiliations
SAMAPTIKA PANDA , Y. KARALI , Dr. C. S. PANDA
Enhancing the security and routing reliability for achieving efficient data transmission in mobile Ad Hoc Networks
A Mobile Ad hoc Network is a wireless network in which a central management scheme is not available; this causes nodes to dynamically self-organize each one playing both router and node’s roles. Compared to the other typ...
An Approach to Memory management in Wireless Sensor Networks
In recent years, wireless sensor network has become an important research domain. A typical WSN is a multi-hop wireless network consisting of hundreds or thousands of small sensor devices that are capable of sensing, pro...
IMPROVING QUALITY OF SERVICE FOR 4G DEVICES USING MULTIPATH ROUTING ON AD-HOC NETWORK
Information and Communication technology try to reach the realistic world in the virtual system via using the 4G communication devices in real time applications. While adopting the 4G communication devices in the exiting...
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
An Adoptive approach in Demosaicing True Color from Digital Camera having Bayer Color Filter
Single sensor with Bayer pattern color filters are used to reduce size and cost of consumer digital cameras. These cameras use various demosaicing algorithms to construct the entire image with true colors from the acquir...