Study of Digital Watermarking Techniques for Against Security Attacks

被引:3
|
作者
Maloo, Snehlata [1 ,2 ]
Lakshmi, N. [1 ,2 ]
Pareek, N. K. [1 ,2 ]
机构
[1] Mohanlal Sukhadia Univ, Dept Comp Sci, Udaipur, India
[2] Mohanlal Sukhadia Univ, Dept Phys, Udaipur, India
来源
INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1 | 2018年 / 83卷
关键词
DCT; DWT; SVD; LSB; Digital watermarking; IMAGES;
D O I
10.1007/978-3-319-63673-3_61
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarking is fragile to different authorization and copyright protection in spatial domain, So in the vast majority of watermarking strategy's transform domain is utilized. In that paper we have an review of such computerized watermarking procedures and techniques like discrete wavelet transform (DWT), singular value decomposition (SVD), discrete cosine transformation (DCT) with various methodologies alongside their applications, advantages and limitations.
引用
收藏
页码:509 / 515
页数:7
相关论文
共 50 条
  • [41] A Geometrical Approach to Enhance Security Against Cyber Attacks in Digital Substations
    Elrawy, Mohamed F.
    Fioravanti, Camilla
    Oliva, Gabriele
    Michael, Maria K.
    Setola, Roberto
    IEEE Access, 2024, 12 : 18724 - 18738
  • [42] A Geometrical Approach to Enhance Security Against Cyber Attacks in Digital Substations
    Elrawy, Mohamed F.
    Fioravanti, Camilla
    Oliva, Gabriele
    Michael, Maria K.
    Setola, Roberto
    IEEE ACCESS, 2024, 12 : 18724 - 18738
  • [43] A Survey of Reversible Watermarking Techniques, Application and Attacks
    Thilagavathi, N.
    Saravanan, D.
    Kumarakrishnan, S.
    Punniakodi, Sakthivel
    Amudhavel, J.
    Prabu, U.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [44] On the security of mesh-based media hash-dependent watermarking against protocol attacks
    Lu, CS
    Yu, CM
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 169 - 172
  • [45] RFPS: A Robust Feature Points Detection of Audio Watermarking for Against Desynchronization Attacks in Cyber Security
    Lu, Wenhuan
    Li, Ling
    He, Yuqing
    Wei, Jianguo
    Xiong, Neal N.
    IEEE ACCESS, 2020, 8 : 63643 - 63653
  • [46] Watermarking attack: Security of WSS techniques
    Cayre, F
    Fontaine, C
    Furon, T
    DIGITAL WATERMARKING, 2005, 3304 : 171 - 183
  • [47] A Review on Watermarking Techniques for Multimedia Security
    Macit, Huseyin Bilal
    Koyun, Arif
    ARTIFICIAL INTELLIGENCE AND APPLIED MATHEMATICS IN ENGINEERING PROBLEMS, 2020, 43 : 406 - 417
  • [48] Digital Watermarking Technology in Information Security
    Li, YingChun
    Zhao, LiFang
    ADVANCED RESEARCH ON MATERIAL ENGINEERING, CHEMISTRY AND BIOINFORMATICS, PTS 1 AND 2 (MECB 2011), 2011, 282-283 : 55 - 58
  • [49] Network security and confidentiality with digital watermarking
    Bansal, Er. Ashish
    Bhadouria, Sarita Singh
    2007 INAUGURAL IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2007, : 375 - +
  • [50] The security performance evaluation of digital watermarking
    Zhang, Xinhong
    Li, Shejiao
    Zhang, Fan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 762 - 763