Sonam Tyagi, H. Singh, Raghav Agarwal, Sandeep Kumar Gangwar
{"title":"Digital watermarking techniques for security applications","authors":"Sonam Tyagi, H. Singh, Raghav Agarwal, Sandeep Kumar Gangwar","doi":"10.1109/ICETEESES.2016.7581413","DOIUrl":null,"url":null,"abstract":"Nowadays, the success of internet technology, made our life very much easy and convenient. But the major problem is to secure the data from duplication and unauthorized use. So the digital watermarking is used. With this technology, we embed the secret information into the actual information for protecting it from unauthorized use. By using this technique only authorized user can access the data. It may be classified into two domains that are spatial domain and frequency domain. In this paper, we have briefly discussed about these technologies and their pros and cons.","PeriodicalId":322442,"journal":{"name":"2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Emerging Trends in Electrical Electronics & Sustainable Energy Systems (ICETEESES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETEESES.2016.7581413","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32
Abstract
Nowadays, the success of internet technology, made our life very much easy and convenient. But the major problem is to secure the data from duplication and unauthorized use. So the digital watermarking is used. With this technology, we embed the secret information into the actual information for protecting it from unauthorized use. By using this technique only authorized user can access the data. It may be classified into two domains that are spatial domain and frequency domain. In this paper, we have briefly discussed about these technologies and their pros and cons.