An Analysis and Overview of Modern Digital Watermarking
Y. Arockia Raj and P. Alli
DOI : 10.3844/ajassp.2012.66.70
American Journal of Applied Sciences
Volume 9, Issue 1
Problem statement: The major growth of information technology is based on the growth of computer networks. The computer network diminished the entire global in a nutshell, via the internet and the intranet capabilities. Approach: In the recent year, communicating information within authenticated groups in the text, image and video formats are highly unavoidable one. And in the same manner, there are more possibility that the communicated information to be hacked by the anonymous hacker. Results: The hacker may be passive or active; it is highly risk for many engineering applications like military network. Hence, digital watermarking is merged to rectify the above pitfalls. Conclusion: Watermarking techniques developed for images are mainly classified into visible and invisible approaches. The study further analyses the modern digital watermarking system.
© 2012 Y. Arockia Raj and P. Alli. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.