Principles of Digital Watermarking: Present Scenario and Future Scope

Principles of Digital Watermarking: Present Scenario and Future Scope

Naresh Kumar Trivedi, Suresh Kumar, Shikha Maheshwari
DOI: 10.4018/978-1-7998-2772-6.ch017
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter introduces the benefits of watermark over cryptography and stenography. It provides the digital ownership on a file, but the noise is also attached with the file. Even if somebody copies the file and claims ownership, watermark still provides security. Watermarking is a robust and secured technique compared to other techniques. Implementation cost of this technique is optimized. This chapter also elucidates the attacks on watermarks and solutions to handle these attacks. Authors suggest watermarking will remain unchanged even if the file is compressed.
Chapter Preview
Top

Introduction

In an advanced world, the covering up of information is extensively executed through cryptography, stenography and watermarking. In Cryptography, information is changed over to an indiscernible structure as only an approved individual with a key is permitted to decipher it. Different techniques are accessible to decode a figures content. Consequently, propelled procedures were expected to give preferable security over cryptography. This came about to the disclosure of watermarking and stenography. In Stenography, it conceals data from the spread item with the goal that the client cannot see it. The aggressor is ignorant of the mystery data that exists within the substance. In Watermarking, shrouded data is related to the spread item. In this way, it is utilized for copyright security and proprietor verification.

Utilization of the Internet with advanced data, including various sorts of sounds, videos and picture records, influences worldwide society, the world economy, and the manner in which society imparts. Interactive media information in the computerized configuration, like pictures, sounds and videos, open numerous difficulties and opportunities for enemies. Through Internet associations, the free transmission of data helps individuals to send an enormous number of sight and sound records and make different advanced duplicates. Various duplicates of digital media documents don't influence the nature of computerized records. For example, sound and video. This issue causes impressive financial misfortune in the proprietor business.

Encryption is the spine of a security system. However, on account of the computerized media documents, for example; sound, video, and picture being encoded, an encryption key is utilized.

The procedure of data covering up in media like sound, video or picture is sorted into two frameworks. These frameworks are known as steganographic frameworks where messages are kept quiet. In a non-steganographic framework or watermarking framework, the concealed message isn't a mystery. Table 1 shows this context.

Table 1.
Comparison of watermarking and steganographic systems
Host signal dependent messageHost signal independent message
Information HiddenCovert CommunicationSteganographic System
Information KnownWatermarking SystemEmbedded Communication

The effectiveness in which advanced data can be copied and conveyed has prompted the requirement for successful copyright assurance instruments. One approach to secure mixed media information against illicit account and retransmission is to implant a sign known as the computerized mark, copyright name, or watermark that completely portrays the individual who applies it and imprints it as their licensed innovation.

Watermarking alludes to the implanting of an unnoticeable ID in the information which recognizes the proprietor or the beneficiary of the information. Fingerprinting doesn't mean cryptographically hashing the information into a mark that can be utilized to recognize the information exceptionally. The inserted ID can be distinguished and decoded from fingerprinted information at whatever point and any place the information is experienced. This procedure might be accomplished using computerized watermarking systems.

Complete Chapter List

Search this Book:
Reset