Artificial Intelligence Techniques for DWT Based Image Watermarking
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
In this paper DWT and SVM based image digital watermarking has been presented. In proposed work firstly Fuzzy logic will be used for training based on membership functions and DWT. The DWT will be used for decomposition into HL, LL, LH, LL components. Then watermark embedding has been performed using SVM then extraction of hidden message will be done. The parameter evaluation has been measured using PSNR, MSE, BER and time consumption. The results of our scheme show realization and robust experiments and it has been observed that this method has preferable performance in MTLAB environment.
Authors and Affiliations
Manpreet Kaur , Kamalpreet Kaur
A Performance Evaluation on Face Image Enhancement with Salt & Pepper Noise Using Gaussian Filtering
Filtering of noise is one of the most important tasks in digital image processing. Elimination of noise is an image is still a challenging task for the researchers. Various researches were underlying on face recognition...
Computer Aided Music Generation Using Genetic Algorithm and Its Potential Applications
Music speaks what cannot be expressed, soothes the mind and gives it rest, heals the heart and makes is whole. Not everyone is gifted with a good voice but almost everyone has good ears when it comes to pleasant music. T...
A Study for Finding Location of Nodes in Wireless Sensor Networks
The popularity of Wireless Sensor Network (WSN) has increased tremendously in recent times. WSN has the potential to connect the physical world with the virtual world by forming a network of sensor nodes. Sensor nodes tr...
Survey on a Novel approach for Reversible Data Hiding: Principles, Techniques and Recent studies
Today data hacking is a very big problem in networking field. There are many security techniques are available for solving the problem. One of these data-hiding, using this concept we can provide security, authentication...
Centralized Bandwidth Distribution And Utility Provider
This paper is focused the problem faced by large offices and companies. It is helpful to keep observation on employees work for saving companies valuable time. Also it can control his activity. It provides server desktop...