DocumentCode
3239123
Title
Critical Review of Perceptual Models for Data Authentication
Author
Sherekar, S.S. ; Thakare, V.M. ; Jain, Sanjeev
Author_Institution
Deptt. Of Comput. Sci., SGB Amravati Univ., Amravati, India
fYear
2009
fDate
16-18 Dec. 2009
Firstpage
323
Lastpage
329
Abstract
The large-scale communication of multimedia data on Internet motivates the protection of digital information against illegal duplication and manipulation. Advances that facilitate electronic publishing and commerce also heighten threats of intellectual property theft and unlawful tampering. This work is concerned with the perceptual models used for data protection, secrete communication, author´s identification for copyright protection. To achieve this, various technologies such as cryptography, stegonagraphy and digital watermarking are required. This paper, focus on, specifically, these perceptual models with their working principal, structure, properties, various applications, possible attacks, recent trends and their advantages & disadvantages.
Keywords
cryptography; message authentication; steganography; telecommunication security; watermarking; copyright protection; cryptography; data authentication; digital information protection; digital watermarking; intellectual property theft; multimedia data communication; perceptual models; steganography; Authentication; Business; Copyright protection; Cryptography; Electronic publishing; Intellectual property; Internet; Large-scale systems; Multimedia communication; Watermarking;
fLanguage
English
Publisher
ieee
Conference_Titel
Emerging Trends in Engineering and Technology (ICETET), 2009 2nd International Conference on
Conference_Location
Nagpur
Print_ISBN
978-1-4244-5250-7
Electronic_ISBN
978-0-7695-3884-6
Type
conf
DOI
10.1109/ICETET.2009.66
Filename
5395011
Link To Document