Classification of Watermarking Based upon Various Parameters

With the rapid growth of the Internet and multimedia systems in distributed environments, it is easier for digital data owners to transfer multimedia documents across the Internet. Therefore, there is an increase in concern over copyright protection of digital contents [Piva et al (2002); Lu et al (2001); Lu et al (2000); Lee and Jung (2001)]. Traditionally, encryption and control access techniques were employed to protect the ownership of media. These techniques, however, do not protect against unauthorized copying after the media have been successfully transmitted and decrypted. Recently, watermark techniques are utilized to maintain the copyright [Barni et al (2000); Petitcolas (1999); Eskicioglu and Delp (2001)].In this paper, we study the different types of watermarking based upon the various parameters.

[1]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[2]  Sung-Hwan Jung,et al.  A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).

[3]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[4]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[5]  Mauro Barni,et al.  Managing Copyright in Open Networks , 2002, IEEE Internet Comput..

[6]  Shih-Kun Huang,et al.  Cocktail Watermarking for Digital Image Protection , 2000, IEEE Trans. Multim..

[7]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[8]  Edward J. Delp,et al.  An overview of multimedia content protection in consumer electronics devices , 2001, Signal Process. Image Commun..

[9]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .