Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking

Abstract

Watermark is used to protect copyright and to authenticate images. In digital media, today’s world images are in electronic form available in the internet. For its protection and authentication invisible watermarking in encrypted form are used. In this paper encryption is done using fuzzy Compliment-Max-Product matrix and then encrypted watermark is embedded in the digital media at desired places using fuzzy rule. The Region of Interest (ROI) is decided with fuzzification. Then, watermark is inserted at the respective positions in the image. Robustness of watermark is judged for ROI. This method of watermarking is done on all image file formats and it is resistant for geometric, noise and compression attack.

Authors and Affiliations

Sharbani Bhattacharya

Keywords

Related Articles

Fast DC Mode Prediction Scheme For Intra 4x4 Block In H.264/AVC Video Coding Standard

In this paper, the researchers proposed a new scheme for DC mode prediction in intra frame for 4X4 block. In this scheme, the upper and left neighboring pixels would be used to predict each of the pixels in the 4X4 block...

Implicit Thinking Knowledge Injection Framework for Agile Requirements Engineering

Agile has become commonly used as a software development methodology and its success depends on face-to-face communication of software developers and the faster software product delivery. Implicit thinking knowledge has...

Need and Role of Scala Implementations in Bioinformatics

Next Generation Sequencing has resulted in the generation of large number of omics data at a faster speed that was not possible before. This data is only useful if it can be stored and analyzed at the same speed. Big Dat...

Towards end-to-end Continuous Monitoring of Compliance Status Across Multiple Requirements

Monitoring compliance status by an organization has been historically difficult due to the growing number of compliance requirements being imposed by various standards, frameworks, and regulatory requirements. Existing...

CAT5:A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework

Companies have more and more trends to automate their operational and organizational activities, therefore the investment of information technology (IT) continues to increase every year. However, good governance that can...

Download PDF file
  • EP ID EP152576
  • DOI 10.14569/IJACSA.2014.050620
  • Views 84
  • Downloads 0

How To Cite

Sharbani Bhattacharya (2014). Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking. International Journal of Advanced Computer Science & Applications, 5(6), 130-134. https://europub.co.uk/articles/-A-152576