Robust Image Watermarking Theories and Techniques: A Review



Título del documento: Robust Image Watermarking Theories and Techniques: A Review
Revista: Journal of applied research and technology
Base de datos: PERIÓDICA
Número de sistema: 000387376
ISSN: 1665-6423
Autores: 1
2
1
3
Instituciones: 1University Malaysia Pahang, Faculty of Computer System and Software Engineering, Pekan, Pahang. Malasia
2Qinghai Normal University, Department of Mathematics and Information, Xining, Qinghai. China
3University Malaysia Pahang, Faculty of Electrical and Electronic Engineering, Pekan, Pahang. Malasia
Año:
Periodo: Feb
Volumen: 12
Número: 1
Paginación: 122-138
País: México
Idioma: Inglés
Tipo de documento: Artículo
Enfoque: Experimental, aplicado
Resumen en inglés Over the past several decades, digital information science has emerged to seek answers to the question: can any technique ensure tamper-resistance and protect the copyright of digital contents by storing, transmitting and processing information encoded in systems where digital content can easily be disseminated through communication channels? Today it is understood that the answer is yes. This paper reviews the theoretical analysis and performance investigation of representative watermarking systems in transform domains and geometric invariant regions. Digital watermarking is a technology of embedding watermark with intellectual property rights into images, videos, audios, and other multimedia data by a certain algorithm. The basic characteristics of digital watermark are imperceptibility, capacity, robustness and false positive of watermarking algorithm and security of the hiding place. Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen application areas
Disciplinas: Ciencias de la computación
Palabras clave: Procesamiento de datos,
Seguridad en cómputo,
Marca de agua,
Imágenes robustas
Keyword: Computer science,
Data processing,
Computing security,
Watermark,
Robust images
Texto completo: Texto completo (Ver HTML)