Loading

Digital Watermarking and Other Data Hiding Techniques
Gurpreet Kaur1, Kamaljeet Kaur2

1Gurpreet Kaur, Student, Shiri Guru Granth Sahib World Uni Fatehgarh Sahib.
2Kamaljeet Kaur, Assistant Professor, Shiri Guru Granth Sahib World Uni Fatehgarh Sahib.
Manuscript received on 15 April 2013 | Revised Manuscript received on 22 April 2013 | Manuscript Published on 30 April 2013 | PP: 181-183 | Volume-2 Issue-5, April 2013 | Retrieval Number: E0711042413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Digital watermarking is not a new name in the technology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Steganography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need watermarking for digital data security .It provides ownership assertion, authentication and integrity verification, usage control and content labelling.
Keywords: Cryptography, Digital signature, Fingerprinting, Steganography, Watermarking.

Scope of the Article: Data Analytic