Steganography and Digital Watermarking

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 14: Line 14:
== Applications ==
== Applications ==
-
Possible applications for both steganography and digital watermarking are listed below. Some applications may use both techniques depending on the function required.
+
Steganography and digital watermarking can be broken down into four different subcategories in which the existence of the technique is either known or unknown to the public.  
 +
 +
Knowing the subcategories allows for the following possible applications for both steganography and digital watermarking. Some applications may use both techniques depending on the function required.
===Steganography===
===Steganography===

Revision as of 22:34, 7 April 2009

Steganography and digital watermarking are both forms of information hiding where the context can be viewed as keeping the information a secret or making the information subtle respectively. Both these methods have been around for a long time, at least several centuries, however they have only gained worldwide popularity in the digital world since roughly the mid 1990s. With new technologies constantly emerging, these two methods have been used to prevent theft, prevent plagiarism, track, and hide secrets.


Contents

History

Test


Applications

Steganography and digital watermarking can be broken down into four different subcategories in which the existence of the technique is either known or unknown to the public.


Knowing the subcategories allows for the following possible applications for both steganography and digital watermarking. Some applications may use both techniques depending on the function required.

Steganography

Some applications of steganography are:

Protection of Data Alteration

Confidential Communication

Media Database Systems

Access Control

fgfd


Watermarking

Some applications that use digital watermarking are:

Broadcast Monitoring

Owner Identification

Proof of Ownership

Transaction Tracking

Content Authentication

Copy Control

Device Control

Legacy Enhancement

Properties

Models and Techniques

Countermeasures


Personal tools