Digital watermarking algorithms for multimedia data

S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma
{"title":"Digital watermarking algorithms for multimedia data","authors":"S. H. Islam, Arup Kumar Pal, S. Prasad, Soumitra Roy, Raunak Rungta, Shikha Verma","doi":"10.1049/PBSE009E_CH5","DOIUrl":null,"url":null,"abstract":"Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.","PeriodicalId":373543,"journal":{"name":"Authentication Technologies for Cloud Computing, IoT and Big Data","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Authentication Technologies for Cloud Computing, IoT and Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBSE009E_CH5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Nowadays, the remarkable growth of Internet technology makes multimedia applications popular. However, the security issue of multimedia data is a big concern due to the openness of the Internet. The threats may occur in terms of illegal copying and/or unauthorized manipulation of multimedia data. From the last few decades, digital watermarking has been considered as one of the promising solutions for controlling the content from unlawful manipulation and redistribution. In watermarking, a watermark or logo is embedded in the original image. The watermark can be extracted later for applications such as copyright protection, ownership verification, content authentication, and so on. In this context, the watermarking is addressing broadly into two application areas such as copyright protection using robust watermarking and to detect illegal content manipulation through fragile watermarking approach. One more type of watermarking, called semi-fragile watermarking, is also quite popular. It is sustainable against certain attacks for the purpose of copyright protection and is applicable for reinforcing the authentication property of multimedia documents. So, the aim of this chapter is to discuss watermarking approaches such as robust, fragile, and semi-fragile in the context of basic requirements or principles, and developing procedures. We also discuss the state-of-the-art as well as some possible research scope in this particular area.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多媒体数据的数字水印算法
如今,互联网技术的飞速发展使得多媒体应用得到了广泛的应用。然而,由于互联网的开放性,多媒体数据的安全问题备受关注。这些威胁可能发生在非法复制和/或未经授权的多媒体数据操作方面。在过去的几十年里,数字水印被认为是一种很有前途的解决方案,以防止非法操纵和再分发的内容。在水印技术中,水印或标志嵌入到原始图像中。水印可以稍后提取,用于版权保护、所有权验证、内容认证等应用。在这种背景下,水印被广泛地分为两个应用领域,即利用鲁棒水印保护版权和利用脆弱水印方法检测非法内容操纵。还有一种类型的水印,称为半脆弱水印,也很受欢迎。它可以抵御某些攻击,达到保护版权的目的,适用于增强多媒体文档的认证特性。因此,本章的目的是在基本要求或原则以及开发程序的背景下讨论诸如鲁棒、脆弱和半脆弱等水印方法。我们还讨论了这一特定领域的最新技术以及一些可能的研究范围。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Authentication issues for cloud applications Data authentication algorithms Information security The insider threat problem from a cloud computing perspective Conclusion
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1