A Survey & Applications of Various Watermarking & Encryption Techniques

Here the paper contains various watermarking technique implemented so far and their different request areas are analyzed and discussed here. Although various techniques of watermarking are already implemented for the confidential information hiding some of them are examined and collate here on the basis of certain parameters including PNSR, watermark signal strength and Bit Error Rate. Since Watermarking enables hiding of secrete statistics such that the data can be secreting when sending to receiver.

[1]  Fazidah Othman,et al.  Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .

[2]  S.A.M. Gilani,et al.  A Fragile Watermarking Scheme for Color Image Authentication , 2008 .

[3]  B. B. Zaidan,et al.  Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.

[4]  Arup Kumar Pal,et al.  A DCT-SVD based robust watermarking scheme for grayscale image , 2012, ICACCI '12.

[5]  Vijay Laxmi,et al.  Detection attack analysis using partial watermark in DCT domain , 2012, SIN '12.

[6]  A. A. Zaidan,et al.  New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique , 2009 .

[7]  Anamitra Makur,et al.  Watermark based recovery of tampered documents , 2012, ISI-KDD '12.

[8]  Suneeta Agarwal,et al.  A region specific robust watermarking scheme based on singular value decomposition , 2012, SIN '12.

[9]  Omar Zakaria,et al.  Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.

[10]  Anamitra Makur,et al.  Tamper-proof image watermarking using self-embedding , 2012, ISI-KDD '12.

[11]  Qinyu Zhang,et al.  Feature-based watermarking using discrete orthogonal Hahn moment invariants , 2009, FIT.

[12]  Mohan S. Kankanhalli,et al.  Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[13]  Ujan Mukhopadhyay,et al.  Enhancing the security of digital Video Watermarking using watermark encryption , 2012, CCSEIT '12.

[14]  Stephen D. Wolthusen,et al.  Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.

[15]  Thomas Stütz,et al.  On efficient transparent jpeg2000 encryption , 2007, MM&Sec.

[16]  Koichi Harada Parity enhanced topology based spot area watermarking method for copyright protection of layered 3D triangular mesh data , 2006 .

[17]  Stéphane Bounkong Digital image watermarking , 2004 .

[18]  B. B. Zaidan,et al.  New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.