Comparative Studies of various Digital Image & Audio Watermarking Techniques
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 3
Abstract
In this paper a brief review of various audio and image watermarking techniques has been carried out. Properties of both image and audio are different while processing. In this work a blind frequency masking algorithm for hiding the image data into audio signal using DCT is proposed. DCT provides compression & to avoid distortions from DCT compression, additional password key would be used to encrypt data in frequency domain. The secret key or a password would be required to extract a data, also helps to make the data immune from "noise" effects represented by the addition the host signal in the embedder. In a blind watermark detector, the un-watermarked host signal is unknown, and cannot be removed before a watermark extraction. Under these conditions. Ikchha Pandey | Siddarth Bhalerao | Papiya Dutta"Comparative Studies of various Digital Image & Audio Watermarking Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12700.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12700/comparative-studies-of-various-digital-image-and-audio-watermarking-techniques/ikchha-pandey
Socio-economic Dimensions, Issues and Implications of Post-Independence Odisha and its Manifestation in Odia Poetry with a Special Case Study of Guruprasad Mohanty's Kaalapurusha
The paper tries to unveil the truths beneath the texts of Post-Independence Odia poetry especially of the text Kaalapurusha, a long committed poem by Guruprasad Mohanty. Various poets are there in this phase those who ar...
A Survey Paper on Identity Theft in the Internet
Identity of any internet user is stole in seconds and the user may not aware about it. There are various tools available in the internet which allow anyone to steal data of any particular user, if he she is connected to...
Chaos Based Image Encryption Technique
Due to internet explosion there has been considerable rise in transmission of data such as tex, images, text, videos, etc over internet. Here security is required for transmission of data over internet so that data is se...
Impact of Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) on Unemployment and Village Economy
Eradicating Extreme Poverty and Hunger is the first and the primary concern of Millennium Development Goals (MDGs) . The primary consideration to trigger development should be to maximize work opportunities for the unemp...
Comparative Study on Analysis and Design of Reinforced Concrete Building under Seismic Forces for Different Codal Guidelines
Construction is a vital part of every developing country in this era. Every country has specific building design codes which provide the standards to engineers for the design of various structural components like the bea...