INFORMATION HIDING TECHNOLOGY- A WATERMARKING

MEENA V. KAMBLE1*
1Vidyabharati Mahavidyalaya, Amravati, Department of computer Science, Amravati University, Amravati MS, India
* Corresponding Author : Kamblemeena365@gmail.com

Received : 03-12-2011     Accepted : 12-12-2011     Published : 30-12-2011
Volume : 3     Issue : 1       Pages : 37 - 41
Adv Comput Res 3.1 (2011):37-41

Keywords : sequrity, Digital watermarking, information Hiding, watermarking
Conflict of Interest : None declared

Cite - MLA : MEENA V. KAMBLE "INFORMATION HIDING TECHNOLOGY- A WATERMARKING." Advances in Computational Research 3.1 (2011):37-41.

Cite - APA : MEENA V. KAMBLE (2011). INFORMATION HIDING TECHNOLOGY- A WATERMARKING. Advances in Computational Research, 3 (1), 37-41.

Cite - Chicago : MEENA V. KAMBLE "INFORMATION HIDING TECHNOLOGY- A WATERMARKING." Advances in Computational Research 3, no. 1 (2011):37-41.

Copyright : © 2011, MEENA V. KAMBLE, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

In this Paper, we are discussing about a security which is essential for today world .we briefly discuss the Digital watermarking and historical development of watermarking which is use as a one of the tool for hiding data/ information . We also introduce various data hiding terminologies used in current literature and attempt has clear distinction of them. Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The signal may be audio, pictures or video. In visible watermarking, the information is visible in the picture or video. Typically, the information is text or a logo which identifies the owner of the media. The image on the right has a visible watermark. In invisible watermarking, information is added as digital data to audio, picture or video, but it cannot be perceived as such (although it may be possible to detect that some amount of information is hidden) The watermark may be intended for widespread use and is thus made easy to retrieve or it may be a form of Steganography where a party communicates a secret message embedded in the digital signal.

References

[1] Biermann, Christopher J. (1996) Handbook of Pulping and Papermaking (2 ed.). San Diego, California, USA: Academic Press. p. 171. ISBN 0-12-097362-6  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Bender W., et. Al (1996) IBM Systems Journal,Vol 35, 313(23).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Yeung Minerva (1998) Communications of the ACM, 31(3).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Design (Third ed.). John Wiley & Sons, Inc.. pp. 58. ISBN 978-0471291985  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Craver Scott, et. Al (1998) Communications of the ACM, 45(9).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Fraser Bruce (1998) Macweek, 22(1).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Zhao Jian, et. Al (1998) Communications of the ACM, 67(5).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Metev S. M. and Veiko V. P. (1998) 2nd ed., R. M. Osgood, Jr., Ed. Berlin, Germany: Springer-Verlag.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] Memon Nasir, and Ping WaWong (1998) ProtectingDigitalCommunications of the ACM, 35(8).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[10] Yeung M., Yeo B. & Holliman M. (1998) IEEE Micro, 18(6), 32-41  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[11] Hwang Min-Shiang, et. Al (1999) IEEE Transactions on Computer Electronics, Vol 45, 286(8).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[12] Zhao J., Koch E., & Luo C. (1998) Communications of the ACM,41(7), 67-71  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[13] Voyatzis G., and Pitas I. (1999) IEEE Computer Graphics & Applications, 19(1),18- 24.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus