INVISIBLE MULTIPLE WATERMARKING WITH MINIMUM DISTORTION USING DWT-DCT-CDMA
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 8
Abstract
with the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of watermarks can be embedded in original image to increase its authenticity. After embedding PSNR values are calculated at each watermark embedding and a table is constructed showing PSNR at each level. At the receiver end retrieval of watermark is done by correlation of original image.
Authors and Affiliations
Neha Gupta , Dr. Mukesh Sharma
Importance & Applications of Digital Image Processing
Digital image processing has become economical in many fields like signature recognition, iris recognition and face recognition, in forensics, in automobile detection and in military applications. Each of these applicati...
Human Computer Interface Through Biometric Iris Recognition System
Biometric recognition system is better reliable, roubst technique than traditional recognition system. Biometric iris recognition system is most secure and reliable than other biometric recognition system. Hence, we use...
PROPOSED ARCHITECTURE: CLOUD BASED MEDICAL INFORMATION RETRIEVAL NETWORK
The latest developments and advancements in the computer science and information technology promise a massive potential that can be harnessed for the improvement of healthcare services especially in the developing countr...
Secure Socket Layer Implementations-A Review
Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in betwe...
A Survey on Secure Transmission of Multimedia Objects
Secure Transmission of different multimedia objects like image, text, audio, and video are the most demanding aspects in the internet and network application. Recently, network security is the most important issue of the...