A Comparision and Survey of Invisible and Visible Watermarking with Correctness Measures of Various Attacks

Main Article Content

Y. Arockia Raj

Abstract

The major growth of information technology is based on the growth of computer networks. The computer network diminished the entire global in a nutshell, via the internet and the intranet capabilities. In the recent year, communicating information within authenticated groups in the text, image and video formats are highly unavoidable one. And in the same manner, there are more possibility that the communicated information to be hacked by the anonymous hacker. The hacker may be passive or active; it is highly risk for many engineering applications like military network. Hence, digital watermarking is merged to rectify the above pitfalls. Watermarking techniques developed for images are mainly classified into visible and invisible approaches. The study further analyses the modern digital watermarking system.


Key words: Providing additional information, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Discrete Fourier Transform (DFT), Peak Signal to Noise Ratio (PSNR), sliding square window containing

Downloads

Download data is not yet available.

Article Details

Section
Articles