Digital watermarking techniques for security applications

Nowadays, the success of internet technology, made our life very much easy and convenient. But the major problem is to secure the data from duplication and unauthorized use. So the digital watermarking is used. With this technology, we embed the secret information into the actual information for protecting it from unauthorized use. By using this technique only authorized user can access the data. It may be classified into two domains that are spatial domain and frequency domain. In this paper, we have briefly discussed about these technologies and their pros and cons.

[1]  Borko Furht,et al.  Survey of Watermarking Techniques and Applications , 2004 .

[2]  Chang-Tsun Li,et al.  One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.

[3]  Saeed Mozaffari,et al.  Watermarking in binary document images using fractal codes , 2014, Pattern Recognit. Lett..

[4]  M. Sharma,et al.  Digital watermarking using DWT and DES , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[5]  Jiang Xuehua Digital Watermarking and its Application in Image Copyright Protection , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[6]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[7]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[8]  Rajeev Kumar Singh,et al.  A Survey: Digital Image Watermarking Techniques , 2014 .

[9]  Jaspal Bagga,et al.  Performance Comparison of Digital Image Watermarking Techniques: A Survey , 2013 .

[10]  A. K. Singh,et al.  A novel technique for digital image watermarking in spatial domain , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.

[11]  Jagdish W. Bakal,et al.  ROBUST DIGITAL WATERMARKING TECHNIQUE BY USING DCT AND SPREAD SPECTRUM , 2013 .