Next-Generation Systems and Secure Computing
by Subhabrata Barman, Santanu Koley, Subhankar Joardar
2Watermarking: Characteristics, Methods, and Evaluation
Soumitra Roy1* and Bappaditya Chakraborty2
1Dept. of CSE, Dr. Sudhir Chandra Sur Institute of Technology & Sports Complex, Dum Dum, Kolkata, India
2Maulana Abul Kalam Azad University of Technology, Kolkata, India
Abstract
In the last decade, digitization of multimedia data (video, audio, images) is a common factor for the cost, space, and more significantly time effective business models with the swift progression of communication networks. In this counterfeit planet, counterfeiting, forging, alteration, and limitless replication of digital data are produced by illegitimate users with easily available user-friendly software and hardware materials. These criminal-minded people use the modern web network to distribute altered digital data in a smooth, errorless, and economical way. Thus, the main flaw for this transmitted digital data is not have inbuilt inherent security. Recently researchers suggested that this inbuilt inherent security can be provided to digital data if they satisfied confidentiality, integrity, and authenticity features. Stopping unlawful access by illegitimate consumers is confidentiality whereas locating the alteration of digital content by unlawful users is integrity. Authentication prevents countless illicit distributions of copyrighted digital materials. Both the cryptography and steganography mechanisms guaranteed confidentiality features. The foremost shortcoming of the cryptographic and steganographic ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access