Digital Watermarking Technology in Different Domains
الموضوعات : journal of Artificial Intelligence in Electrical Engineering
1 -
الکلمات المفتاحية: Watermarking, domain, DCT, DWT,
ملخص المقالة :
Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Digital watermarking is a well-known technique used for copy rights protection ofmultimedia data. A number of watermarking techniques have been proposed in literature. DigitalWatermarking is the process that embeds data called a watermark into a multimedia object such thatwatermark can be detected or extracted later to make an assertion about the object. A variety oftechniques in different domains have been suggested by different authors to achieve above mentionedconflicting requirements. All the watermarking techniques are different from each other and are usedfor differing applications.
[1]W. Zhu, et al, ”Multi-resolution
Watermarking for Images and Video”,
IEEE Tran. on Circuits & Systems for
Video Technology, Vol.9, No.4, June 1999,
pp.545-550.
[2] Bassia P., Pitas I., and Nikolaidis 2001,
“Robust Audio Watermarking in Time
Domain”, IEEE Trans. On Multimedia,
Vol. 3, pp. 232-241.
[3] Bender W., Gruhl D., Morimoto N. and Lu
A. 1996, “Techniques for Data Hiding”,
IBM Systems Journal, Vol. 35, No. 3&4,
pp. 313- 335.
[4]J. T. Brassil, et al., ”Electronic Marking and
Identification Techniques to Discourage
Document Copying”, IEEE Journal on
Selected Areas in Communications, Vol.13,
No.8, Oct 1995, pp.1495-1504.
[5]C. Cachin, “An Information-Theoretic
Model for Steganography”, Proceedings of
2
nd
Workshop on Information Hiding, MIT
Laboratory for Computer Science, May
1998
[6]David Kahn, ”Codebreakers : Story of
Secret Writting”, Macmillan 1967.
[7]David Kahn, ”The History of
Steganography”, Proc. of First Int.
Workshop on Information Hiding,
Cambridge, UK, May30-June1 1996,
Lecture notes in Computer Science,
Vol.1174, Ross Anderson(Ed.), pp.1-7.
[8]F.A.P.Petitcolas, et al., ”Information Hiding
- A Survey”, Proceedings of the IEEE,
Vol.87, No.7, July 1999, pp.1062-1078
[9]R. B. Wolfgang and E. J. Delp, "A
watermark for digital images," Proceedings
of the IEEE International Conference on
Image Processing, Lausanne, Switzerland,
Sept. 16-19, 1996, vol. 3, pp. 219-222.
[10]Neha Singh and Arnab Nandi , Digital
Watermarking: mark this technology,
http://www.electronicsforu.com/efylinux/ef
yhome/cover/watermar.pdf.
[11]Navas. K A, Sreevidya S, Sasikumar M “A
benchmark for medical image
watermarking”, 14th International workshop
on systems, signals & image processing and
6th EURASIP Conference focused on
speech & image Processing, Multimedia
Communication and services IWSSIP-2007
& EC-SIPMCS-2007, Maribor, Slovenia,
27-30 June 2007, pp 249-252.
[12]W.Zhu, et al, ”Multi-resolution
Watermarking for Images and Video”,
IEEE Tran. on Circuits & Systems for
Video Technology, Vol.9, No.4, June 1999,
pp.545-550.
[13]C. Shoemaker, Hidden Bits: A Survey of
Techniques for Digital Watermarking,
http://www.vu.union.edu/~shoemakc/water
marking/watermarking.html#watermarkobject,
Virtual Union, 2002
[14]N.F. Johnson, S.C. Katezenbeisser, S.C.
Katzenbeisser et al., Eds. Northwood, “A
Survey of Steganographic Techniques” in
Information Techniques for Steganography
and Digital Watermarking, MA: Artec
House, Dec. 1999, pp 43-75.
[15]Peter Meerwald and Andreas and Jakob-
Haringer-Str. , Uhl,A survey of Waveletdomain
Watermarking Algorithms,
Department of Scientific Computing
,University of Salzburg, Jakob-Haringer-
Str. A-5020 Salzburg, Austria