Abstract
Digital watermarking is fragile to different authorization and copyright protection in spatial domain, So in the vast majority of watermarking strategy’s transform domain is utilized. In that paper we have an review of such computerized watermarking procedures and techniques like discrete wavelet transform (DWT), singular value decomposition (SVD), discrete cosine transformation (DCT) with various methodologies alongside their applications, advantages and limitations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sturges, P.: Remember the human: the first rule of netiquette, librarians and the Internet. Online Inf. Rev. 26(3), 209–216 (2002)
Fifarek, A.: Technology and privacy in the academic library. Online Inf. Rev. 26(6), 366–374 (2002)
Raj, Y.A., Alli, P.: An analysis and overview of modern digital watermarking. Am. J. Appl. Sci. 9(1), 66 (2012)
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography. Morgan Kaufmann, New Jersey (2007)
Agarwal, R., Santhanam, M.S., Venugopalan, K.: Multichannel digital watermarking of color images using SVD. In: 2011 International Conference on Image Information Processing (ICIIP), pp. 1–6. IEEE (2011)
Zhao, J., Koch, E.: Embedding robust labels into images for copyright protection. In: KnowRight, pp. 242–251 (1995)
Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual watermarks for digital images and video. Proc. IEEE 87(7), 1108–1126 (1999)
Pal, K., Ghosh, G., Bhattacharya, M.: Biomedical image watermarking in wavelet domain for data integrity using bit majority algorithm. Am. J. Biomed. Eng. 2(2), 29–37 (2012)
Goyal, H., Chutani, S.: LSB embedding in spatial domain. Int. J. Comput. Technol. 3(1), 153–157 (2012)
Hernández, J.R.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9(1), 55–68 (2000)
Andrews, H.C., Patterson III, C.: Singular value decomposition (SVD) image coding. IEEE Trans. Commun. 24(4), 425–432 (1976)
EL-Emam, N.N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci. 3(4), 223–232 (2007)
Mohan, B.C., Kumar, S.S.: A robust image watermarking scheme using singular value decomposition. J. Multimed. 3(1), 7–15 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Maloo, S., Lakshmi, N., Pareek, N.K. (2018). Study of Digital Watermarking Techniques for Against Security Attacks. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_61
Download citation
DOI: https://doi.org/10.1007/978-3-319-63673-3_61
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-63672-6
Online ISBN: 978-3-319-63673-3
eBook Packages: EngineeringEngineering (R0)