Steganography and Digital Watermarking
From Computing and Software Wiki
Line 13: | Line 13: | ||
== Applications == | == Applications == | ||
+ | |||
+ | Possible applications for both steganography and digital watermarking are listed below. Some applications may use both techniques depending on the function required. | ||
+ | |||
===Steganography=== | ===Steganography=== | ||
+ | |||
+ | Some applications of steganography are: | ||
+ | |||
====Protection of Data Alteration==== | ====Protection of Data Alteration==== | ||
====Confidential Communication==== | ====Confidential Communication==== | ||
Line 23: | Line 29: | ||
===Watermarking=== | ===Watermarking=== | ||
+ | |||
+ | Some applications that use digital watermarking are: | ||
====Broadcast Monitoring==== | ====Broadcast Monitoring==== |
Revision as of 22:23, 7 April 2009
Steganography and digital watermarking are both forms of information hiding where the context can be viewed as keeping the information a secret or making the information subtle respectively. Both these methods have been around for a long time, at least several centuries, however they have only gained worldwide popularity in the digital world since roughly the mid 1990s. With new technologies constantly emerging, these two methods have been used to prevent theft, prevent plagiarism, track, and hide secrets.
Contents |
History
Test
Applications
Possible applications for both steganography and digital watermarking are listed below. Some applications may use both techniques depending on the function required.
Steganography
Some applications of steganography are:
Protection of Data Alteration
Confidential Communication
Media Database Systems
Access Control
fgfd
Watermarking
Some applications that use digital watermarking are: