1. Introduction
Information is becoming widely available via global networks. These connected networks allow cross-references between databases. The advent of multimedia is allowing different applications to mix sound, images, and video and to interact with large amounts of information (e.g., in e-business, distance education, and human-machine interface). The industry is investing to deliver audio, image and video data in electronic form to customers, and broadcast television companies, major corporations and photo arc hivers are converting their content from analogue to digital form. This movement from traditional content, such as paper documents, analogue recordings, to digital media is due to several advantages of digital media over the traditional media.
Digital Watermarking Technique is becoming popular, especially for adding undetectable identifying marks, such as author or copyright information. Because of this use, watermarking techniques are often evaluated based on their invisibility, recoverability, and robustness. Our goal was to implement watermarking method and evaluate their susceptibility to attack by various image processing techniques.
1.1 Problem Statement
An important factor that slows down the growth of multimedia networked services is that authors, publishers and providers of multimedia data are reluctant to allow the distribution of their documents in a networked environment. This is because the ease of reproducing digital data in their exact original form is likely to encourage copyright violation, data misappropriation and abuse. These are the problems of theft and distribution of intellectual property. Therefore, creators and distributors of digital data are actively seeking reliable solutions to the problems associated with copyright protection of multimedia data.
1.2 Objectives
Digital watermarking is the process of embedding information into a digital signal in a way that is difficult to
References: 1. G.J.Simmons. "The prisoner 's problem and the subliminal channel". In "Advances in Cryptography: Proceedings of Crypto-83", 1984. 22. Kundur et.al, "A Robust Digital Image Watermarking Method Using Wavelet-Based Fusion" in Proceedings of International Conference on Image Processing vol 1, 1997 pp. 544-547 23 30. 2. The 8th information hiding conference, 2006, online at http://ih2006.jjtc.com 31