Facebook Twitter Delicious Stumble Upon

Digital Watermarking Applications and Advantages - seminar topics,it seminar topics,latest seminar topics,seminar topics on computer science


Digital Watermarking Applications and Advantages

 

 

Abstract




Digital watermarking is defined as the imperceptibly altering a work in order to embed information about that work. In the recent years copyright protection of digital content became a serious problem due to rapid development in technology. Watermarking is one of the alternatives to copyright-protection problem.


Digital watermarking can be classified as visible and invisible. The visible watermarks are viewable to the normal eye such as bills, company logos and television channel logos etc. This type of watermarks is easily viewable without any mathematical calculation but these embedded watermarks can be destroyed easily. In the case of invisible watermarks, the locations in which the watermark is embedded are secret, only the authorized persons extract the watermark. Some mathematical calculations are required to retrieve the watermark. This kind of watermarks is not viewable by an ordinary eye. Invisible watermarks are more secure and robust than visible watermarks.

The main characteristics of Digital watermark are:
Robustness: The watermark should be able to withstand after normal signal processing operations such as image cropping, transformation, compression etc.
Imperceptibility: The watermarked image should look like same as the original image to the normal eye. The viewer cannot detect that watermark is embedded in it.
Security: An unauthorized person cannot detect, retrieve or modify the embedded watermark.

Depending on the ability of the watermark to withstand normal signal processing operations, digital watermarking can be categorized as robust, fragile and semi-fragile watermarking. Robust watermarks are detectable even after some image processing operations has been performed on the watermarked image such as image scaling, bending, cropping, and so on. Robust watermarks are mainly used for copyright protection. Fragile watermarks became invalid even if a slight modification is done to the watermarked image. Fragile watermarks are mainly used for authentication purpose. Semi-fragile watermarks allow some acceptable distortion to the watermarked image. Beyond this acceptance level if any modification is done to the watermarked image, the watermark will not be detected.

0 comments:

Post a Comment

Labels

10 Gigabit Ethernet 2038 bug 2038 problem 2038 unix 3g mobile 3g mobile network 3g mobiles 3g network A apache load balancer Artificial intelligence Artificial intelligence research .Artificial intelligence ideas bca BE bsa bsc Btech computer science computer science seminar topics computer security computer seminar topics d rt data visualization data visualization blog databases databases security digital convergence digital watermark digital watermarking disable ipv6 dr t drt bick dtr E education ethernet controller ethernet switch F face recoganization free radio free watermark gigabit gigabit ethernet gigabit ethernet card gigabit ethernet lan gigabit ethernet switch gigabit switch grid architecture hirschman herfindahl index how to make a watermark human computer interaction human computer interface human factors IEEE ieee seminar topics information security interface design interface designers internet security ip v6 ipv4 to ipv6 ipv6 ipv6 address ipv6 example ipv6 format ipv6 link local ipv6 ping ipv6 to ipv4 ipv6 tunneling IT it seminar topics latest seminar topics load balancer load balancers load balancing lookout mobile security mca millenium bug mobile computing mobile data mobile database mobile tracker mobiles national seminars network control systems network controller network load balancing network radio network security networking online database parallel computer parallel computers parallel computing parallel processing phone radio radon transform Real-time Transport Protocol RTP rtp online rtp protocol rtp stream rtp udp rtp video rtp.pt rtp1 science seminar topics securewireless network seminar seminar title seminar topic seminar topics seminar topics computer seminar topics in computer science seminar topics it seminars seminartitle steganography stochastic network stock trading seminar topics streaming rtp T technology seminar topics test ipv6 the year 2038 problem training training seminars u Ubiquitous udp rtp ui ui patterns umts unix 2038 unix 2038 problem v video compersion visualization of data visualization tool voicexml Vrml water mark watermark free watermark images watermarking watermarks what is 3g what is wireless lan what is xml windows mobile wireless access point wireless card usb wireless internet network wireless lan wireless n usb wireless network devices wireless networks wireless router wireless usb wireless usb adapter wireless usb adaptor wireless usb drivers wireless usb network adapter wireless usb to usb workshop xml document xml editor xml examples xml file xml files xml format xml parser xml schema y2k38 year 2038 year 2038 problem