Article Preview
TopIntroduction
Digital watermarking is mainly used for protection of the integrity and authenticity of the digital images across a wide range of applications. There a myriad of application areas of digital watermarking like Content identification and management, Content protection for audio and video content, Forensics and piracy deterrence, Communication of ownership and copyrights, Document and image security, Authentication of content and objects (includes government IDs), Broadcast monitoring and others (Ingemar, Matt & Jeffrey,2000). Digital watermarking provisions effective content identification by embedding a unique digital identity to all forms of media content. It is imperceptible to humans, but easily detected and understood by computers, networks and a wide range of common digital devices (Vipula,2011). The usage of watermarks for content management has been discussed in depth by the authors (Shing-Chi, Dickson & Cedric, 2008; Dominic, 2012). Digital watermarking provides an additional layer of security to the content protection chain to combat the unauthorized use of multimedia content. This is achieved by embedding watermarks that identify the permitted uses of the content into the music or motion picture soundtrack prior to theatrical, packaged media and online digital distribution. Devices read the watermark during playback or copying of content. If the watermark indicates that the use is unauthorized, the playback or copying is stopped or the audio is muted, and an explanatory message may be displayed. Few notable works in area of multimedia protection using watermarking is discussed in (Chang-Tsun, 2008; Chun-Shien, 2005). Forensic watermark applications enhance content owner's ability to detect and respond to misuse of its assets. Forensic watermarking is used not only to gather evidence for criminal proceedings, but also to enforce contractual usage agreements between a content owner and the people or companies with which it shares its content (Banerjee et al. 2015). It provides positive, irrefutable evidence of misuse for leaked content assets. Forensic watermarking applications are discussed in detail by the authors (Dey, Das, Das & Chaudhuri, 2012; Chakraborty, Maji, Pal, Biswas & Dey, 2014; Dey, Biswas, Das, Das & Chaudhuri, 2012). Document images are widely and rapidly used in multiple manifestations, through email and across the Internet.