Study of Digital Watermarking Techniques for Against Security Attacks

被引:3
|
作者
Maloo, Snehlata [1 ,2 ]
Lakshmi, N. [1 ,2 ]
Pareek, N. K. [1 ,2 ]
机构
[1] Mohanlal Sukhadia Univ, Dept Comp Sci, Udaipur, India
[2] Mohanlal Sukhadia Univ, Dept Phys, Udaipur, India
关键词
DCT; DWT; SVD; LSB; Digital watermarking; IMAGES;
D O I
10.1007/978-3-319-63673-3_61
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarking is fragile to different authorization and copyright protection in spatial domain, So in the vast majority of watermarking strategy's transform domain is utilized. In that paper we have an review of such computerized watermarking procedures and techniques like discrete wavelet transform (DWT), singular value decomposition (SVD), discrete cosine transformation (DCT) with various methodologies alongside their applications, advantages and limitations.
引用
收藏
页码:509 / 515
页数:7
相关论文
共 50 条
  • [1] Digital Watermarking Techniques for Security Applications
    Tyagi, Sonam
    Singh, Harsh Vikram
    Agarwal, Raghav
    Gangwar, Sandeep Kumar
    2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRICAL ELECTRONICS & SUSTAINABLE ENERGY SYSTEMS (ICETEESES), 2016, : 379 - 382
  • [2] Research on Digital Watermarking Against Geometric Attacks
    Ma Lijuan
    Li Shiyong
    Liang Yunjuan
    Huang Yong
    2011 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE (ICMI 2011), PT 2, 2011, 4 : 684 - 690
  • [3] Countermeasure for collusion attacks against digital watermarking
    Steinebach, M
    Zmudzinski, S
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [4] PERFORMANCE COMPARISON OF OPTIMIZATION TECHNIQUES ON ROBUST DIGITAL-IMAGE WATERMARKING, AGAINST ATTACKS
    Surekha, P.
    Sumathi, S.
    APPLIED ARTIFICIAL INTELLIGENCE, 2012, 26 (07) : 615 - 644
  • [5] Digital watermarking techniques for image security: a review
    Mohanarathinam, A.
    Kamalraj, S.
    Prasanna Venkatesan, G. K. D.
    Ravi, Renjith V.
    Manikandababu, C. S.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (08) : 3221 - 3229
  • [6] A digital robust image watermarking against desynchronization attacks
    Findik, Oguz
    Babaoglu, Ismail
    Ulker, Erkan
    SCIENTIFIC RESEARCH AND ESSAYS, 2010, 5 (16): : 2288 - 2294
  • [7] A Digital Image Watermarking Scheme against Geometric Attacks
    Hengyi, Zhang
    Chen, Xi
    Wang, Xianling
    Yuan, Kaiguo
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION WORKSHOP: IITA 2008 WORKSHOPS, PROCEEDINGS, 2008, : 539 - 543
  • [8] Digital Audio Watermarking Techniques for the security of VOIP Communications
    Er, Fusun C.
    Gul, Ensar
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (03): : 147 - 155
  • [9] Evasion Attacks Against Watermarking Techniques found in MLaaS Systems
    Hitaj, Dorjan
    Hitaj, Briland
    Mancini, Luigi V.
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2019, : 55 - 63
  • [10] A Robust Digital Image Watermarking Method Against Geometric Attacks
    Zhang, Qiang
    Chen, Chen
    Wei, Xiaopeng
    Ma, Runnian
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (10): : 3537 - 3547