Review of Digital Watermarking System: A Robust Method for Protection
| International Journal of Computer Trends and Technology (IJCTT) | |
© - Issue 2013 by IJCTT Journal | ||
Volume-4 Issue-3 | ||
Year of Publication : 2013 | ||
Authors :Sangeeta Madhesiya, Shakil Ahmed |
Sangeeta Madhesiya, Shakil Ahmed"Review of Digital Watermarking System: A Robust Method for Protection"International Journal of Computer Trends and Technology (IJCTT),V4(3):230-235 Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - — In the present scenario of global network of Internet, we want to save our digital data i.e. audios, videos, pictures, texts and so on. For this reason we need a security system. In the field of security system for securing the data on Internet there are many systems. But in the present paper we discussed about the security or protection of these data (audio, video, pictures, texts or 3D models) by using digital watermarking and we try to define different applications, techniques, characteristics, uses, growth and challenges of digital watermarking. Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect copyrights of multimedia digital contents over Internet trading so that ownership of the contents can be determined in subsequent copyrights disputes. We propose a singular value decomposition method, SVD method can transform matrix A into product USVT , which allows us to refactoring a digital image in three matrices. The using of singular values of such refactoring allows us to represent the image with a smaller set of values, which can preserve useful features of the original image, but use less storage space in the memory, and achieve the image compression process. It makes use of intelligence user certificates to embed the identity of the users into the intelligence documents to whom are distributed. In particular, keeping the identity secrecy between document providers and users (but yet traceable upon disputes) is a key contribution of this protocol in order to support for intelligence applications.
References-
[1] A.H. Ali and M. Ahmad, “Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition,” Europe Journal of Science Research, Vol. 39, No. 1, 2010, pp. 6-21.
[2] Bidla P.P., Crengaje S.R., Shelk R.J. “Visible Image Watermarking Based on Texture and Luminance Blocks in DCT Domain – A Review, International Jouranl of Emerging Technology and Advanced Engineering ISSN: 2250-2459, Vol. 2, Issue – 4, 2012.
[3] Chaudhari, B.P.; Gulve, A.K., (2010), “Approaches of Digital Image watermarking using ICA”, Proceedings of ISCET, ISBN: 978-81- 910304-0-2.
[4] Cheung, S. C.; Chiu D. K. W. and Ho C., (2008), “The Use of Digital Watermarking for Intelligence Multimedia Document Distribution”, Journal of Theoretical and Applied Electronic Commerce Research ISSN 0718–1876 Electronic Version VOL 3 / ISSUE 3 / DECEMBER 2008 / 103-118.
[5] Jihua, Z., (2004), “Research on Copyright Protection Technology of Digital Image Based on Digital Watermarking”, Doctor Degree thesis. Changsha, Hunan, China: South-Central University for Nationalities.
[6] Jun, J. M.; Lee, B. M.; Kim, K. K. and Won D. H., (2000), “Digital watermarking and practical distribution protocol for digital contents copyright protection”, in Proceedings of the WISA`2000, Seoul, Korea, pp. 251-264.
Keywords— Multi hop Cellular Networks, Network-level security and protection, payment scheme, Hybrid systems, security analysis.