Watermarking Schemes for High Security with Applications and Attacks: Research Challenges and Open Issues

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, the growth of the internet is increased day by day also the digital data such as videos, images and audio availability to the public get increased rapidly. The society required intellectual property protection. To protect the media from other attack intruders and avoid business loss is the requirement of digital media produced. Introducing watermarks can be useful to safeguard copyright. In this review an effort is made to explore various aspects of watermarking, algorithms used, and to carry out a comparative study of these techniques based on their classifications.

Cite

CITATION STYLE

APA

kumar*, R. A., Reddy, K. S., & Devadhas, G. G. (2019). Watermarking Schemes for High Security with Applications and Attacks: Research Challenges and Open Issues. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 4163–4169. https://doi.org/10.35940/ijrte.d7161.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free