Survey on Digital Watermarking
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

Survey on Digital Watermarking

Jyoti, Jyoti Rani

With the rapid development and wide use of the Internet; information transmission faces a big confront of security. People need a protected and safe way to spread information. Digital watermarking is a procedure of data hiding; which provide security of data. The Digital watermarking method provides the quick and inexpensive distribution of digital information over the Internet. This technique provides new ways of ensuring the adequate security of copyright holders in the rational property dispersion process. The property of digital watermarking images allows insertion of additional data in the image without altering the value of the image. This message is secret in unused visual space in the image and stays below the human visible threshold for the image. This paper presents a watermarking technique which least significant bit (LSB) ; its steps and its process with matlab images. The benefits of the LSB are its simplicity to embed the bits of the message directly into the LSB plane of cover-image and many techniques using these methods.

Keywords: Watermarking, spatial domain, frequency domain, spread spectrum, LSB

Edition: Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Share this Article

How to Cite this Article?

Jyoti, Jyoti Rani, "Survey on Digital Watermarking", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20051402, Volume 3 Issue 5, May 2014, 1172 - 1174

Enter Your Registered Email Address





Similar Articles with Keyword 'Watermarking'

Downloads: 73 | Weekly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1856 - 1858

A Review On Digital Video Watermarking Using DWT

Shweta Sharma, Sarika Chaudhary

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2153 - 2156

Effective Watermarking Techniques on Structured Datasets

Mini Joswin, Deeksha Bhardwaj

Share this Article

Downloads: 108 | Weekly Hits: ⮙6 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1641 - 1646

Discrete Z Transformation based Copyright Protection on Digital Image Using Genetic Algorithm

Prashant C. Harne, Rajesh K. Nigam

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Similar Articles with Keyword 'spatial domain'

Downloads: 104 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Downloads: 110 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1168 - 1171

An Advanced Implementation for Enhancing Color Images Using Histogram Technique

Anubhooti Purbey, Manish Mathuria

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Survey on Digital Watermarking

Jyoti, Jyoti Rani

Share this Article

Similar Articles with Keyword 'frequency domain'

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1984 - 1986

Discrete Cosine Transform based Image Inpainting

Bansi B. Thanki

Share this Article

Downloads: 104 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1587 - 1589

A Survey on Comparison between DCT and DWT Techniques of Image Compression

Pooja Rani, Apoorva Arora

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Downloads: 110 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1968 - 1973

Face Recognition Revisited on Pose, Alignment, Color, Illumination and Expression-PyTen

Mugdha Tripathi

Share this Article

Downloads: 110 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1168 - 1171

An Advanced Implementation for Enhancing Color Images Using Histogram Technique

Anubhooti Purbey, Manish Mathuria

Share this Article

Similar Articles with Keyword 'spread spectrum'

Downloads: 105 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1065 - 1069

Survey of Prevention Techniques for Denial Service Attacks (DoS) in Wireless Sensor Network

Jitendra R. Patil, Manish Sharma

Share this Article

Downloads: 111 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1172 - 1174

Survey on Digital Watermarking

Jyoti, Jyoti Rani

Share this Article

Downloads: 115 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 587 - 590

Extracting Spread Spectrum Data from Image

Sahej Redekar, Dr. Reena Gunjan

Share this Article

Downloads: 121 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 745 - 748

General View on Techniques Used In Image Steganography

Jayshree V. Ingle, M. M. Bartere

Share this Article

Downloads: 141 | Weekly Hits: ⮙4 | Monthly Hits: ⮙17

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 743 - 747

Secure Spread Spectrum Data Embedding and Extraction

Vaibhav Dhore, Pathan Md. Arfat

Share this Article

Similar Articles with Keyword 'LSB'

Downloads: 104 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 105 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1537 - 1542

A Survey on Steganography Techniques

Amruta B. Bhojane, Priti A. Kodake

Share this Article

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this Article



Top