CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Different robustness criteria attacks in watermarking techniques

عنوان مقاله: Different robustness criteria attacks in watermarking techniques
شناسه ملی مقاله: ECMM08_016
منتشر شده در هشتمین کنفرانس بین المللی تحقیقات بین رشته ای در مهندسی برق، کامپیوتر، مکانیک و مکاترونیک در ایران و جهان اسلام در سال 1401
مشخصات نویسندگان مقاله:

Maryam Hamrahi - Young Researchers and Elite Club varzegan Branch, Islamic Azad University,varzegan, Iran
Zahra Hamrahi - Young Researchers and Elite Club, Ahar Branch, Islamic Azad University, Ahar, Iran
Naser Jafari - Student of the Faculty of Electrical and Computer Engineering, Varzaghan Azad University,Varzghan, Iran

خلاصه مقاله:
Digital watermarking applications include content protection for audio and video content, forensicsand piracy deterrence, content filtering, communication of ownership and copyrights, document andimage security, broadcast monitoring and many more. Watermarking technology is an emergingfield in computer science, cryptography, signal processing and communications. Watermarks can beattacked in a variety of different ways, and each application requires its own type of security. Thesecurity requirements for a watermarking system vary greatly from application to application. Insome applications watermarks need not be secure at all. In general, any watermarking scheme(algorithm) consists of three parts: the watermark, the encoder (insertion algorithm), the decoderand comparator (verification or extraction or detection algorithm). A watermarked image is likely tobe subjected to certain manipulations, some intentional such as compression and transmission noiseand some intentional such as cropping, filtering, etc. A number of attacks watermarking have beenproposed in literature. This paper is a tutorial in general watermarking principles and focuses onattacks various watermarking techniques. As attacks are found that work against existingtechniques, it is likely that new techniques will be developed that overcome these deficiencies

کلمات کلیدی:
Digital watermarking; technology; algorithm; attacks.

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1638054/