{"title":"High Security Watermarking Techniques for Digital Rights Management: A Review","authors":"N.T Bushra Abdulla, K. A. Navas","doi":"10.1109/ICCSP48568.2020.9182053","DOIUrl":null,"url":null,"abstract":"Protection of data still remains as an anxiety to the researchers in spite of large number of techniques have been proposed in the literature to protect digital rights and authentication of documents. One of the methods to provide security to the right holders is digital watermarking; the technique of hiding secret message in the document to ensure authentication. Effectiveness of Watermarking depends on the robustness, imperceptibility and security. Presence of online data including audio, images, videos and diagrams in binary representation is fast increasing. New digitization techniques are capable of successfully attacking earlier watermarking techniques. This demands the need of developing new watermarking techniques to prevent the attacks on water-marked images. We attempted in this work to examine recently reported watermarking techniques in the literature which are claimed to be meritorious by the authors In this paper we discuss the merits and inefficiencies of the recently reported techniques which claim many merits. Identification of the room for research will be helpful to the researches to attempt on the development of new techniques.","PeriodicalId":321133,"journal":{"name":"2020 International Conference on Communication and Signal Processing (ICCSP)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Communication and Signal Processing (ICCSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSP48568.2020.9182053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Protection of data still remains as an anxiety to the researchers in spite of large number of techniques have been proposed in the literature to protect digital rights and authentication of documents. One of the methods to provide security to the right holders is digital watermarking; the technique of hiding secret message in the document to ensure authentication. Effectiveness of Watermarking depends on the robustness, imperceptibility and security. Presence of online data including audio, images, videos and diagrams in binary representation is fast increasing. New digitization techniques are capable of successfully attacking earlier watermarking techniques. This demands the need of developing new watermarking techniques to prevent the attacks on water-marked images. We attempted in this work to examine recently reported watermarking techniques in the literature which are claimed to be meritorious by the authors In this paper we discuss the merits and inefficiencies of the recently reported techniques which claim many merits. Identification of the room for research will be helpful to the researches to attempt on the development of new techniques.