International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 12, December 2013

A Survey of Digital Watermarking Techniques and its Applications

Kusuma Kumari B. M

Digital watermarking is the act of hiding a message related to a digital signal (i.e. an image, song, video ) within the signal itself. Watermarking tries to hide a message related to the actual content of the digital signal. Digital watermarking is a technology being developed to ensure and facilitate data authentication, security and copyright protection of digital media. The purpose of digital watermarks is to provide copyright protection for intellectual property that is in digital format. This paper incorporate the detail survey about watermarking, it starts with overview, classification, features, techniques, application, challenges, and limitations of watermarking.

Keywords: watermarking, techniques, requirements, properties, challenges

Edition: Volume 2 Issue 12, December 2013

Pages: 309 - 313


How to Cite this Article?

Kusuma Kumari B. M, "A Survey of Digital Watermarking Techniques and its Applications ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013645, Volume 2 Issue 12, December 2013, 309 - 313

24 PDF Views | 18 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'watermarking'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1982 - 1986

Enhanced Robust and Reversible Watermarking for Supervised Learning Data

Madhuri V. Gaikwad, Prof. R. A. Kudale

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1434 - 1437

Quality Estimation of Image with Watermark

Firdouz.M

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 645 - 649

Software Theft Detection for JavaScript Programs Based on Dynamic Birthmark Extracted from Runtime Heap Graph

Somanath Janardan Salunkhe, Umesh Laxman Kulkarni

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1546 - 1550

An Optimal Digital Image Watermarking based on SVD and Genetic Algorithm

Shreya Tayal, SPS Chauhan

Share this article

Similar Articles with Keyword 'techniques'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 685 - 689

Secure Routing in Wireless Sensor Networks through the Identified Trusted Node

D. Latha, K. Palanivel

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1270 - 1273

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Shishir Sharma, Gajendra Singh Chandel

Share this article

Similar Articles with Keyword 'requirements'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2762 - 2766

Large Scale Data Shared by Peer to Peer Based System in Shared Network

Bhavsar Harshada V., Dr. S. V. Gumaste, Prof. Deokate Gajanan S.

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2037 - 2038

A Survey on Service Management Mechanisms in Service Oriented Computing

Anish Bhagwat

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1969 - 1973

Scalability of Multimedia Streaming Service: A Cross-Layer Perspective

A. Vaishnavi, B. Sasidhar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1582 - 1586

Switching of Cloud Resources among IPTV Services for Better Utilization

Ravi Bhillu Jadhav, Nirmala Y Bariker

Share this article

Similar Articles with Keyword 'properties'

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 895 - 898

Enhancement of High SRs and Low SDs of bTSE using Trace Based Simulation in Mobile Social Network

Rajesh Kumar, R. Hariharan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1849 - 1852

Implementation of Spring Parameters with Computer Based Simulation Process ? A Review

Ponam Dahiya, Garima Garg

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2621 - 2624

Topology Control in Mobile Computing with Optimal Uplink Query Processing

Syeda Husna Mehanoor, Syeda Ayesha Thainiath

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Similar Articles with Keyword 'challenges'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1360 - 1364

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour, Lal Chand Panwar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2505 - 2507

Performance Management in Network Management System

Shankar N, Dr. Shantharam Nayak

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1233 - 1237

Novel Class Detection for Feature Evolving Data Streams

Harshada Wagaskar, Prof. Gayatri Bhandari

Share this article

Top