Steganography and Digital Watermarking
From Computing and Software Wiki
(Difference between revisions)
Line 15: | Line 15: | ||
===Steganography=== | ===Steganography=== | ||
====Protection of Data Alteration==== | ====Protection of Data Alteration==== | ||
- | ====Confidential | + | ====Confidential Communication==== |
+ | ====Media Database Systems==== | ||
+ | ====Access Control==== | ||
+ | |||
+ | ===Watermarking=== | ||
+ | |||
+ | ====Broadcast Monitoring==== | ||
+ | ====Owner Identification==== | ||
+ | ====Proof of Ownership==== | ||
+ | ====Transaction Tracking==== | ||
+ | ====Content Authentication==== | ||
+ | ====Copy Control==== | ||
+ | ====Device Control==== | ||
+ | ====Legacy Enhancement==== | ||
+ | |||
Revision as of 22:15, 7 April 2009
Steganography and digital watermarking are both forms of information hiding where the context can be viewed as keeping the information a secret or making the information subtle respectively. Both these methods have been around for a long time, at least several centuries, however they have only gained worldwide popularity in the digital world since roughly the mid 1990s. With new technologies constantly emerging, these two methods have been used to prevent theft, prevent plagiarism, track, and hide secrets.
Contents |
History
Test