Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 6
Abstract
Watermark is used to protect copyright and to authenticate images. In digital media, today’s world images are in electronic form available in the internet. For its protection and authentication invisible watermarking in encrypted form are used. In this paper encryption is done using fuzzy Compliment-Max-Product matrix and then encrypted watermark is embedded in the digital media at desired places using fuzzy rule. The Region of Interest (ROI) is decided with fuzzification. Then, watermark is inserted at the respective positions in the image. Robustness of watermark is judged for ROI. This method of watermarking is done on all image file formats and it is resistant for geometric, noise and compression attack.
Authors and Affiliations
Sharbani Bhattacharya
Fast DC Mode Prediction Scheme For Intra 4x4 Block In H.264/AVC Video Coding Standard
In this paper, the researchers proposed a new scheme for DC mode prediction in intra frame for 4X4 block. In this scheme, the upper and left neighboring pixels would be used to predict each of the pixels in the 4X4 block...
Implicit Thinking Knowledge Injection Framework for Agile Requirements Engineering
Agile has become commonly used as a software development methodology and its success depends on face-to-face communication of software developers and the faster software product delivery. Implicit thinking knowledge has...
Need and Role of Scala Implementations in Bioinformatics
Next Generation Sequencing has resulted in the generation of large number of omics data at a faster speed that was not possible before. This data is only useful if it can be stored and analyzed at the same speed. Big Dat...
Towards end-to-end Continuous Monitoring of Compliance Status Across Multiple Requirements
Monitoring compliance status by an organization has been historically difficult due to the growing number of compliance requirements being imposed by various standards, frameworks, and regulatory requirements. Existing...
CAT5:A Tool for Measuring the Maturity Level of Information Technology Governance Using COBIT 5 Framework
Companies have more and more trends to automate their operational and organizational activities, therefore the investment of information technology (IT) continues to increase every year. However, good governance that can...