Digital Watermarking Trends

Download Full Text
Author(s):
Sarabjeet Singh
Published Date:
September 29, 2011
Issue:
Volume 1, Issue 1
Page(s):
55 - 61
DOI:
10.7815/ijorcs.11.2011.005
Views:
4274
Downloads:
762

Keywords:
watermarking, dwt, spatial domain, transform domain, wavelet transform, cosine transform
Citation:
Sarabjeet Singh, "Digital Watermarking Trends". International Journal of Research in Computer Science, 1 (1): pp. 55-61, September 2011. doi:10.7815/ijorcs.11.2011.005 Other Formats

Abstract

Digital Watermarking is the technique used by researchers to hide user defined information along with important information that may be visible or invisible depending upon the requirements of the user. Now Digital Watermarking is concerned with the ownership of the information. Absence of Digital Watermark in the information results in loss of revenue. The Digital Watermark packed with the information should be inseparable. This paper will present here the different tr ends that are followed in the digital watermarking.

  1. J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” in Proc.Infocom’ 94,1994, pp. 1278-1287.
  2. J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” IEEE J Select. Areas Commun., vol. 13, pp. 1495-1504, 1995. doi:10.1109/49.464718
  3. J. Brassil, S. Low, and N. Maxemchuk “Copyright protection for the electronic”
  4. R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional polygonal models through geometric and topological modifications,” IEEE J. Select. Areas Commun., vol. 16, pp. 551-560, May 1998. doi:10.1109/49.668977
  5. F. Hartung, P. Eisert, and B. Girod, “Digital watermarking of mpeg-4 facial animation parameters,” Comput. Graph., vol. 22, no. 4, pp. 425-435, Aug. 1998. doi:10.1016/S0097-8493(98)00032-6
  6. J. Bloom, I. Cox, T. Kalker, J.P. Linnartz, M. Miller, and C. Traw, “Copy protection for dvd video,” Proc. IEEE,, no. 87, pp. 12667-1276, July, 1999. doi:10.1109/5.771077
  7. Data Hiding Subgroup; http:www.dvcc.comdhsg.
  8. F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., vol. 66, no. 3, pp. 283-301, May 1998. doi:10.1016/S0165-1684(98)00011-5
  9. F. Hartung, “Digital watermarking and fingerprinting of uncompressed and compressed video,” Ph.D.dissertation, Shaker Verlag, Univ. of Erlangen-Nuremberg, Aachen, Germany, Oct. 1999.
  10. C. Langelaar, R. Lagendijk, and J. Biemond, “Realtime labeling of mpeg-2 compressed video,” J. Vis. Commun. Image Represent., vol. 9, no. 4, pp. 256-270, Dec. 1998. doi:10.1006/jvci.1998.0397
  11. G. C. Langelaar, “Real-time watermarking techniques for compressed video cata,” Ph.D. thesis, Delft Univ. of Technology, 2000. Video watermarking system for broadcast monitoring,” in
  12. Proc.SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, Jan. 1999, vol. 3657, pp. 103-112.
  13. F. Jordan, M. Kutter, and T. Ebrahimi, “Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video,” in ISO/IEC Doc. JTC1/SC29/WG11/MPEG97/M2281, July 1997.
  14. J. Dittmann, M. Stabenau, and R. Steinmetz, “Robust mpeg video watermarking technologies,” in Proc. ACM Multimedia, Sept. 1998, pp. 71-80.
  15. B. Macq and J.-J. Quisquater, “Cryptology for digital tv broadcasting,”Proc. IEEE, vol. 83, pp. 944-957, 1995. doi:10.1109/5.387094
  16. L. Boney, A. Tewfik, and K. Hamdy, “Digital watermarks for audio signals,” in IEEE Proc. Multimedia, 1996, pp. 473-480. doi:10.1109/MMCS.1996.535015
  17. N.D. Jayant, J.D. Johnston, and R.J. Safranek, “Signal compression based on models of human perception,” Proc.IEEE, vol. 81, pp. 1385-1422, Oct. 1993. doi:10.1109/5.241504
  18. M. Swanson, B. Zhu, and A. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE J. Select. Areas Commun., vol. 16, pp. 525-539, May 1998. doi:10.1109/49.668976
  19. M. Swanson, B. Zhu, A. Tewfik, and L. Boney, “Robust audio watermarking using perceptual masking,” 337-355.
  20. W. Bender, D. Gruhl, and N. Morimoto, “Techniques for data hiding,” IBM Syst. J., vol. 35, nos. 3-4, pp. 313-336, 1996. doi:10.1147/sj.353.0313

  • Megha, Kunal D., Nimesh P. Vaidya, and Asst Prof Ketan Patel. "Digital Watermarking: Data Hiding Techniques using DCT-DWT Algorithm." International Journal of Advanced Research in Computer and Communication Engineering 2.6 (2013).
  • Shelke, Nitin A., and P. N. Chatur. "A Survey on Various Digital Video Watermarking Schemes." International Journal of Computer Science & Engineering Technology (IJCSET): 1447-1454.
  • Bhatnagar, Shalabh, Sudhakar Kumar, and Arpan Gupta. "An approach of efficient and resistive digital watermarking using SVD." Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on. IEEE, 2014.
  • Shelke, Nitin A., and P. N. Chatur. "Blind Robust Digital Video Watermarking Scheme using Hybrid Based Approach."