Digital Watermarking for Image Authentication
Chapter
First Online:
Abstract
This chapter serves as an introduction to digital watermarking, and various aspects pertinent to digital watermarking techniques for data authentication are discussed. The chapter is focused on multimedia authentication in general and image authentication in particular. Requirements for watermarking techniques are listed. A classification of watermarking techniques is given followed by a security analysis. Watermarking techniques for image authentication are briefly discussed in the end.
Keywords
Digital watermarking Requirements Classification Robustness PerceptibilityReferences
- 1.C. Ling, O. Ur-Rehman, Watermarking for image authentication, in Robust Image Authentication in the Presence of Noise, ed. by N. Zivic (Springer, New York, 2015), pp. 43–74Google Scholar
- 2.L. Kumar Saini, V. Shrivastava, A survey of digital watermarking techniques and its applications. Int. J. Comput. Sci. Trends Technol. 2(3) (May-Jun 2014)Google Scholar
Copyright information
© Springer International Publishing AG, part of Springer Nature 2018