Watermarking Schemes for High Security with Applications and Attacks: Research Challenges and Open Issues 
Rahul Ajithkumar1, K. Satyanarayan Reddy2, G.Glan Devadhas3
1Rahul Ajithkumar, Research Scholar, VTU, Belagavi, Karnataka, India
2K. Satyanarayan Reddy, Professor & Head, Department of Information Science & Engineering, Cambridge Institute of Technology, Bangalore, Karnataka State, India
3G.Glan Devadhas, Professor, Department of Electronics & Instrumentation, Vimal Jyothi Engineering College, Kerala.

Manuscript received on November 6, 2019. | Revised Manuscript received on November 20, 2019. | Manuscript published on 30 November, 2019. | PP: 4163-4169 | Volume-8 Issue-4, November 2019. | Retrieval Number: D7161118419/2019©BEIESP | DOI: 10.35940/ijrte.D7161.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Recently, the growth of the internet is increased day by day also the digital data such as videos, images and audio availability to the public get increased rapidly. The society required intellectual property protection. To protect the media from other attack intruders and avoid business loss is the requirement of digital media produced. Introducing watermarks can be useful to safeguard copyright. In this review an effort is made to explore various aspects of watermarking, algorithms used, and to carry out a comparative study of these techniques based on their classifications.
Keywords: Watermarking, Capacity, Robust, DCT, DWT, PCA, Spread Spectrum.
Scope of the Article: Web-Based Learning: Innovation and Challenges.