Defended Data Embedding For Chiseler Avoidance in Visible  Cryptography by Using Morphological Transform Domain

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2

Abstract

 This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate  images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we  propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind  watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the  block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in  discovering the edges and also gets the low computational complication. There are two case that twisting the  candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding,  that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A  contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the backward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present  pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.

Authors and Affiliations

Nalla Bariki Praveen Kumar

Keywords

Related Articles

Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend

Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...

 Ant Colony Optimization for Wireless Sensor Network: A Review

 Abstract: A wireless sensor network is a gathering of specific transducers with a correspondences foundationfor observing and recording conditions at diverse areas. Ant colony optimization algorithm (ACO) is aproba...

A Systematic Review of Software Security Issues Associated With Agile Software Development

Abstract: Main aim of this research is to review various software security issues associated with agile software development. Software security issues which are considered are types of design and code changes, lack of do...

Solar Energy Prediction using LM-Back-propagation in ANN

Artificial intelligence has made its presence felt ubiquitously in different avenues of research and technology wherein the data is large and complex. In the proposed work, to forecast solar irradiation energy; whose str...

Enhancement of Dynamic Load Balancing Using Particle Swarm Algorithm in Cloud Environment

Abstract: Dynamic load balancing with decentralized load balancer using PSO technique: Cloud consists of multiple resources and various clients request to the cloud for allocation of shared resources. Each request will b...

Download PDF file
  • EP ID EP110087
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

Nalla Bariki Praveen Kumar (2013).  Defended Data Embedding For Chiseler Avoidance in Visible  Cryptography by Using Morphological Transform Domain. IOSR Journals (IOSR Journal of Computer Engineering), 15(2), 17-21. https://europub.co.uk/articles/-A-110087