1 Level DWT Image Watermarking Algorithm for RGB Cover Images and Watermarks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: This paper proposes a new 1 level DWT (Discrete wavelet transform) robust image watermarking algorithm for RGB cover images and watermarks. In the proposed algorithm 1 level DWT is applied on RGB cover image. The DWT divides cover image into four bands namely a lower resolution approximation image (LL) as well as horizontal (HH), vertical (LH) and diagonal (HL) detail components and watermark is inserted into LL sub band. As high frequency sub-band is usually removed through noise attacks. The proposed algorithm is imperceptible as well as robust against wide variety of image processing attacks like Gaussian noise, Salt –pepper noise, Gaussian filter, Median filter, Histogram Equalization etc. The watermarked image is of good quality and achieves high PSNR. The proposed watermarking algorithm shows efficient detection of watermark. Extracted RGB watermark is same as that of original watermark with NC value as 0.99
Authors and Affiliations
Jaya Jeswani
Emotion Recognition using combination of MFCC and LPCCwith Supply Vector Machine
Abstract: Speech is a medium through which emotions are expressed by human being. In this paper, a mixtureof MFCC and LPCC has been proposed for audio feature extraction. One of the greatest advantage of MFCC isthat it i...
Modeling an Expert System for Diagnosis of Gestational Diabetes Mellitus Based On Risk Factors
Expert systems are recent product of artificial intelligence. It is a set of programs that manipulate encoded knowledge to solve problems in a specialized domain. Diabetes is a chronic illness that requires continuo...
A Novel Approach for Detection of Blackhole Attacks
The MANET (Mobile Adhoc Network) is a wireless distributed network. It is formed by group of autonomous mobile nodes without any infrastructure like access points. Every node of MANET can acts as router as well as host....
Detecting multiple Blackhole and Grayhole attacks in MANETS by modifying AODV
Abstract: Ad hoc networking refers to as network with no fixed Infrastructure. When the nodes are assumed to be capable of moving in the network, then networks are referred as MANETs (mobile ad hoc networks).Securi...
Detection of Clone Attack in Wsn
Abstract: One of the most vexing problems in wireless sensor network security is the node Clone attack. In thisattack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node b...