Efficient Watermarking Technique for Digital Media (Images and Videos)
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 5
Abstract
In This Paper we are going to purpose an efficient Watermarking Technique for Digital Media Content Protection and Copyright Protection. Watermarking is a technique to embed hidden and unnoticeable signal into digital media in such a way that if an intruder wants to copy it, he can be caught on the basis of Copyright protection and Ownership Identification. There are many Techniques that are available to watermark the data, In our purposal we are discussing DWT Technique which is most robust to attacks rather than LSB for the protection of Digital Images. We will try to find the Quality loss after the addition of watermark after applying various attacks on Watermarked Image, the more the quality loss will be there lesser will be the efficiency of Watermarking. There will be Many Factors that can effect the quality of the Images after the addition of Watermarking that are discussed in Later Section. The Creating on GUI and Implementation of our purposed Algorithm will be realized using MATLAB.
Authors and Affiliations
Chirag Sharma , Deepak Prashar
An Efficient Text Clustering Approach using Affinity Propagation with weight modification
Recently the text mining has emerged as one of the most important fields of data mining because of most of the searching in the web is done on the basis of provided text, also the increasing use of social web network use...
USER INTEREST LEVEL BASED PREPROCESSING ALGORITHMS USING WEB USAGE MINING
Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy...
Comparison of variable learning rate and Levenberg-Marquardt back-propagation training algorithms for detecting attacks in Intrusion Detection Systems
This paper investigates the use of variable learning rate back-propagation algorithm and Levenberg-Marquardt back-propagation algorithm in Intrusion detection system for detecting attacks. In the present study, these 2 n...
On the Timing Analysis of Cluster based Communication Devices for Large Scale Computing Systems
Many parallel computing environments utilize cluster based architecture for large scale computing owing to the ease of their availability. As the cluster based approach may be used extensively, the interconnection mechan...
A new similarity measure for image segmentation
We try to extract the component image virtually hidden in the principle image. Information theoretic quantities are used to measure similarity of images in a statistical frame work. Statistical method describes the textu...