Volume 3 | Issue 2 | Year 2012 | Article Id. IJMTT-V3I2P509 | DOI : https://doi.org/10.14445/22315373/IJMTT-V3I2P509
Now a days the copyright of multimedia and secrete information is very difficult to transfer across the internet multimedia objects must be compressed before transmitting the data. The JPEG compression is one of the most important criteria in watermarking issue. Watermarking, which belong to the information hiding technique? There is a lot of work begin conducted in different branches in this field, Stegnography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. We classify the techniques based on different domains in which data is embedded. Here we limit the survey to images only. However, making digital data accessible to others through networks also creates opportunities for malicious parties to make sailable copies of copyrighted content without permission of the content owner. Digital watermarking techniques have been proposed as a solution to the problem of copyright protection of multimedia data in network environments.
[1] Jiri Fridrich* a,b, Miroslay Goljan Center for Intelligent Systems, SUNNY Binghamton, Binghamton, NY 13902-6000, Mission Research corporation, 1720 Randolph Rd SE, Albuquerque, NM 87106.
[2] Y. Yang, F. Bao and R.H. Deng, “Flexible authentication of images”, in Proc. of the SPIE, Visual Communications and Image Processing 2003.Edited by Ebrahimi, Touradj; Sikora, Thomas. vol. 5150, pp. 1905-1911, 2003.
[3] M.S. Hwang, C.C. Chang, and K.F. Hwang, “A watermarking technique based on one-way hash functions”, IEEE Transactions on Consumer Electronics, vol. 45, no. 2, pp. 286-294, May 1999.
[4] C. Candan, “A multiple description coding scheme based on the Chinese remainder theorem”, in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, May 2002, pp. IV-3525 – IV-3528.
[5] C.C. Chang, P. Tsai and C.C. Lin, “SVD-based digital image watermarking scheme”, Pattern Recognition Letters, vol. 26, pp. 1577- 1586, 2005.
[6] C. Bornand HEIG-VD, Yverdon-les-Bains University of Applied Sciences, Switzerland 2008 IEEE International Conference on Systems, Ma n and Cybern etics (SMC 2008)
[7] Vidyasagar M. Potdar, Song Han, Elizabeth Chang School of Information Systems, Curtin University of Technology, Perth, Western Australiahttp://www.petitcolas.net/fabien/watermarking/stinnark
[8] Cryptography and Information Security Maiko Kobe, Japan, Jan. 25-28, 2005 The Institute of Electronics, Information and Communication Engineers
[9] H. Garner, “The residue number system”, IRE Transactions on Electronic Computers, EC-8, pp. 140–147, 1959.
[10] Chiou, C.W and Yang, T.C. (1994):” Iterative Modular Multiplication algorithm without Magnitude Comparison,” Electronic letters. Vol. 30, No. 24, Nov. 94, pp 2017-2018.
[11] Hasted, j. (1985):”On Using RSA with low exponent in a public key Network,” Proc. Of CRYPTO-85, Springer-verlag, New York, 1986, pp. 403-408.
Dr.A.S.N. Chakravarthy, Prof.S.BALAJI, Rammohanarao Koduri, "Evaluation of Watermarking Techniques," International Journal of Mathematics Trends and Technology (IJMTT), vol. 3, no. 2, pp. 82-85, 2012. Crossref, https://doi.org/10.14445/22315373/IJMTT-V3I2P509