@article {10.3844/ajassp.2012.66.70, article_type = {journal}, title = {An Analysis and Overview of Modern Digital Watermarking}, author = {Raj, Y. Arockia and Alli, P.}, volume = {9}, year = {2011}, month = {Nov}, pages = {66-70}, doi = {10.3844/ajassp.2012.66.70}, url = {https://thescipub.com/abstract/ajassp.2012.66.70}, abstract = {Problem statement: The major growth of information technology is based on the growth of computer networks. The computer network diminished the entire global in a nutshell, via the internet and the intranet capabilities. Approach: In the recent year, communicating information within authenticated groups in the text, image and video formats are highly unavoidable one. And in the same manner, there are more possibility that the communicated information to be hacked by the anonymous hacker. Results: The hacker may be passive or active; it is highly risk for many engineering applications like military network. Hence, digital watermarking is merged to rectify the above pitfalls. Conclusion: Watermarking techniques developed for images are mainly classified into visible and invisible approaches. The study further analyses the modern digital watermarking system.}, journal = {American Journal of Applied Sciences}, publisher = {Science Publications} }