A Survey on Digital Image Authentication by DCT and RPM Based Watermarking
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: An image watermarking, data is embedded into cover media to prove ownership. Various Watermarking techniques are proposed by several authors within the last many years that embody spatial domain and transform domain watermarking. This paper elaborates quality of discrete cosine transform forimage watermarking, DCT primarily based image watermarking method, classification and analysis of discrete cosine transform based mostly watermarking techniques. The aim of this paper is to produce a comprehensive review of the existing literature available on discrete cosine transform and wavelet based mostly image watermarking ways. It’ll be helpful for researchers to implement effective image watermarking methodology.
Authors and Affiliations
Kuldeep Singh , Prof. Ashish Mishra
Securing Cloud Data Storage
Innovations are necessary to ride the inevitable tide of change. Most of enterprises are striving to reduce their computing cost through the means of virtualization. This demand of reducing the computing cost has...
Steiner Tree: approach applying for shortest path in selected network
This paper focus on approach for shortest path from source to destination in which an autonomous system for virtual private network, whose communicate with each other in a private area. For selecting a shorte...
Study of Simulation for Data Webhousing System by ChallengingTechnology and Performing Tuning Techniques
Abstract: One of the most widely discussedtechnologiesare theInternet and itsassociated environmenttheWorldWide Web.Web technologyhasa broad popular supportamong entrepreneursand technicians likewise.The web environment...
Colorectal Cancer Detection using Image Processing based on IGVF Model
Colorectal cancer is the third most common cancer in both men and women. Computed Tomography (CT) Colonography is a valid technique for detecting and screening colorectal cancers. In order to accomplish an effective way...
Input Cumulative Cryptosystem for Scalable Information Contribution in Cloud
Abstract: In Cloud computing, data storing and sharing is a capable methodology. This study illuminates secure, powerful, and versatile system to give data to different people in Cloud storage structure. This review,depi...