2018
DOI: 10.5120/ijca2018916729
|View full text |Cite
|
Sign up to set email alerts
|

Data Hiding and Watermarking Techniques: A Survey

Abstract: Internet is used as a leading object for simple and effective communication because of advancements technology and science. Several users access the internet and maintain their information by the help of various medium in secure and effective way. Security of information is provided by digital water marking and cryptographic techniques for patent defences, fiddle recognition and content authentication of digital information. In this paper, a widespread survey of several techniques for data hiding are explained… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 37 publications
0
1
0
Order By: Relevance
“…The calculation speed is faster and the amount of embedding is higher, but the attack resistance and noise robustness are poor [2][3][4]. Watermarking techniques based on frequency domains with the transformations such as DWT, DCT and discrete Chedyshev transform [5][6][7][8][9][10][11]. These methods usually have good robustness, and against numerous known attacks.…”
mentioning
confidence: 99%
“…The calculation speed is faster and the amount of embedding is higher, but the attack resistance and noise robustness are poor [2][3][4]. Watermarking techniques based on frequency domains with the transformations such as DWT, DCT and discrete Chedyshev transform [5][6][7][8][9][10][11]. These methods usually have good robustness, and against numerous known attacks.…”
mentioning
confidence: 99%