A Novel Watermarking Technique Based on Visual Cryptography
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Digital Watermark processing technology has developed very rapidly during the recent years and widely applied to protect the copyright of digital image. In today’s scenario protection of digital data is utmost necessary in every part of life. More robust methods are being developed to protect the proprietary rights of the multimedia. In this paper, an invisible watermarking technique is proposed, to embed multiple binary watermarks into digital medical images based on the concept of Visual Cryptography (VC). The proposed scheme embeds the watermarks without modifying the original host image. Multiple watermarks can be embedded as shares in the same image. In addition, the size of the watermarks is not restricted to being smaller than that of the original host image. Experimental results prove that, the output of proposed watermarking technique gives good similarity ratio, peak signal to noise ration and correlation coefficient.
Authors and Affiliations
A. Umaamaheshvari, , K. Thanushkodi,
An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...
A STUDY OF DIFFERENT ATTACKS IN MANET AND DISCUSSION ABOUT SOLUTIONS OF BLACK HOLE ATTACK ON AODV PROTOCOL
MANET are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join...
Overview Of Video Condensation In Streaming Video
proficient browsing of long video series a main tool in video surveillance. Example: for earlier event video forensics, but can also be used for quick review of moving pictures and home videos. Since there are ma...
Healthcare monitoring system for web-enabled smart buildings
This paper describes the implementation of a wireless healthcare device in a web technology based smart building. The device has multiple communication interfaces like Bluetooth and 6LoWPAN, and multiple monitoring...
Energy efficient and Demand based Topology Maintenance for various network traffic conditions
Due to the nodes’ limited resource in the adhoc networks, the scalability is the crucial for network operation. Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the firs...