Subscribe Now Subscribe Today
Science Alert
Curve Top
Information Technology Journal
  Year: 2006 | Volume: 5 | Issue: 3 | Page No.: 471-475
DOI: 10.3923/itj.2006.471.475
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

A Comprehensive Analysis of Digital Watermarking

Muhammad Aamir Qureshi and Ran Tao

Copyright protection of digital contents has become more and more important in accordance with the development of digital technology. As a solution of this predicament, digital watermark technology is drawing attention and various watermarking methods have been presented and studied. Digital watermarking provides protection of intellectual property in the digital world. Just as plagiarism runs rampant in the physical world, unauthorized copying of data whether it be audio, visual, or video exists in the digital world. Digital watermarking attempts to copyright the digital data that is freely available on the World Wide Web to protect owner`s rights. As opposed to traditional, printed watermarks, digital watermarks are transparent signatures. They are integrated within digital files as noise, or random information that already exists in the file. Thus, detection and removal of the watermark becomes more difficult. Typically, watermarks are dispersed throughout the entire digital file such that manipulation of one portion of the file does not alter the underlying watermark. However, it is difficult to decide which method is better than others, because the measure for evaluating their performance has not been established yet. Recently, digital contents can be easily accessed by using computer networks and the problem of protecting multimedia information becomes more and more important. To resolve various problems occurring in these upcoming areas and future emerging disciplines, digital watermark technology is now drawing attention as a new method and technique of protecting copyrights for digital data. Digita1 watermark is realized by embedding information data with an insensible form for human audio/visual systems. It must be difficult for an attacker to remove watermark purposely. In this paper an outline of watermarking and analysis of the various techniques used in the area of image watermarking is presented.
PDF Fulltext XML References Citation Report Citation
  •    Large Capacity Data Hiding Combined with Secure-intra-watermarking Based on H.264/AVC
  •    Reversible Data Hiding Based on Orthogonal Prediction Error Modification and Multilevel Histogram Shifting
  •    Quantization based Semi-fragile Watermarking Scheme for H.264 Video
  •    A Blind Image Watermarking Scheme Using Fast Hadamard Transform
How to cite this article:

Muhammad Aamir Qureshi and Ran Tao, 2006. A Comprehensive Analysis of Digital Watermarking. Information Technology Journal, 5: 471-475.

DOI: 10.3923/itj.2006.471.475






Curve Bottom