2016
DOI: 10.5120/ijca2016908976
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Watermarking Techniques

Abstract: With the widespread use of Internet, transfer of digital data online is enormous. This leads to easy accessibility and vulnerability to attacks of copyrighted content on large scale. Digital data in form of videos, audios, text, images can easily be manipulated, forged and redistributed for profits. To overcome this problem and protect copyrighted content, Digital Watermarking emerged as a useful solution. This paper talks about the literature survey of different watermarking techniques and showcase the compar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…It only imparts frequency information without location updates [12]. It is full video/image transform, implying that any changes made to transform coefficients will affect the entire video/image [6]. This technique gives robust results against geometric attacks like cropping, scaling, and translation.…”
Section: Transforms Used In Watermarking Scheme 31 Dftmentioning
confidence: 99%
See 1 more Smart Citation
“…It only imparts frequency information without location updates [12]. It is full video/image transform, implying that any changes made to transform coefficients will affect the entire video/image [6]. This technique gives robust results against geometric attacks like cropping, scaling, and translation.…”
Section: Transforms Used In Watermarking Scheme 31 Dftmentioning
confidence: 99%
“…It can withstand attacks like sharpening, blurring, filtering but unlike DWT it lack in imperceptibility as it cannot be modelled as HVS. Applying mid-band frequency can provide better trade-off between imperceptibility and robustness [6]. Real time applications of DCT are pan card, employee e-card, or fingerprint identity.…”
Section: Dctmentioning
confidence: 99%