An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract : With the advent of internet digital media has been improving with massive advancement in recent years. The distribution of unauthorized copies of media content has also been increasing day by day. Because of easy access to digital content, online purchasing and distribution becomes easier. Thus there is an urgent need to provide protection for digital content. One solution gaining popularity in protecting digital content is digital watermarking. In proposed scheme, a breadth-first search technique is used to find the efficient embedding point to embed the watermark. The proposed algorithm results show that the experiment offers better image quality and robustness under various attacks and alteration, such a, cropping, JPEG compression sharpening and filtering among others. The resultshave manifested the higher robustness and imperceptibility of this scheme when compared with other available watermarking techniques.
Authors and Affiliations
Sanjida Sharmin , Rahima Afrose , Lutfur Nahar , Nargis Akter
A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols
Abstract: In mobile adhoc network nodes dynamically forms networks, there is no any central infrastructure, thus routing becomes a very important issue. Routing protocols used in mobile ad hoc networks (MANET) must...
A New Skin Color Based Face Detection Algorithm by CombiningThree Color Model Algorithms
Abstract: Human face recognition systems have gained a considerable attention during last decade due to itsvast applications in the field of computer and advantages over previous biometric methods. There are manyap...
Duplicate Detection in Hierarchical Data Using XPath
Abstract: There were many techniques for identifying duplicates in relational data, but only a few solutions focus on identifying duplicates which has complex hierarchical structure, as XML data. In this paper, we presen...
A Study of Various Spoofing Attacks and Attackers in Wireless Networks.
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional se...
Exploring Different Forms of Trust towards Trusting Intention in Social Media for E-Commerce Purpose
social media has been described as a platform for sharing information, buying and selling of goods and services through the internet. Thus, it has been described as a place where electronic commerce is been t...