Revista: | Journal of applied research and technology |
Base de datos: | PERIÓDICA |
Número de sistema: | 000387376 |
ISSN: | 1665-6423 |
Autores: | Tao, Hai1 Chongmin, Li2 Zain, Jasni Mohamad1 Abdalla, Ahmed N3 |
Instituciones: | 1University Malaysia Pahang, Faculty of Computer System and Software Engineering, Pekan, Pahang. Malasia 2Qinghai Normal University, Department of Mathematics and Information, Xining, Qinghai. China 3University Malaysia Pahang, Faculty of Electrical and Electronic Engineering, Pekan, Pahang. Malasia |
Año: | 2014 |
Periodo: | Feb |
Volumen: | 12 |
Número: | 1 |
Paginación: | 122-138 |
País: | México |
Idioma: | Inglés |
Tipo de documento: | Artículo |
Enfoque: | Experimental, aplicado |
Resumen en inglés | Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas |
Disciplinas: | Ciencias de la computación |
Palabras clave: | Procesamiento de datos, Seguridad en cómputo, Marca de agua, Imágenes robustas |
Keyword: | Computer science, Data processing, Computing security, Watermark, Robust images |
Texto completo: | Texto completo (Ver HTML) |