Robust Digital Watermarking Techniques for protecting copyright Applied to Digital Data: A Survey
Main Article Content
Abstract
The colossal prominence of the World Wide Web in the mid 1990's shown the business capability of offering media assets through the computerized networks. Since business intrigues look to utilize the advanced organizations to offer computerized media revenue driven, they have a solid interest in ensuring their proprietorship rights. Since the danger of utilizing media data, advanced fabrications, and unapproved sharing (robbery) of
computerized content has expanded among content makers, merchants and clients. Today mixed media data theft alone has exposed all the enterprises to multi-billion income misfortunes. Customary advanced substance security methods, for example, encryption and scrambling, alone can't give satisfactory insurance of copyrighted substance, in light of the fact that these advances can't ensure computerized content whenever they are decoded. One approach to debilitate illicit duplication is to embed data known as watermark, into possibly weak information so that it is difficult to isolate the watermark from the information. Computerized watermarking is the way toward embedding’s an advanced sign or example inside a computerized picture, which gives proof of realness. This paper presents a study on different data concealing strategies and depicts characterization of advanced Watermarking procedures.
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.