Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Using Morphological Transform Domain
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in discovering the edges and also gets the low computational complication. There are two case that twisting the candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding, that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the backward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.
Authors and Affiliations
Nalla Bariki Praveen Kumar
Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend
Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...
Ant Colony Optimization for Wireless Sensor Network: A Review
Abstract: A wireless sensor network is a gathering of specific transducers with a correspondences foundationfor observing and recording conditions at diverse areas. Ant colony optimization algorithm (ACO) is aproba...
A Systematic Review of Software Security Issues Associated With Agile Software Development
Abstract: Main aim of this research is to review various software security issues associated with agile software development. Software security issues which are considered are types of design and code changes, lack of do...
Solar Energy Prediction using LM-Back-propagation in ANN
Artificial intelligence has made its presence felt ubiquitously in different avenues of research and technology wherein the data is large and complex. In the proposed work, to forecast solar irradiation energy; whose str...
Enhancement of Dynamic Load Balancing Using Particle Swarm Algorithm in Cloud Environment
Abstract: Dynamic load balancing with decentralized load balancer using PSO technique: Cloud consists of multiple resources and various clients request to the cloud for allocation of shared resources. Each request will b...