Design and Simulation of Dct Chip In Vhdl and Application in Watermark Extraction
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The paper presented the design, modeling and chip implementation of 2D Discrete Cosine Transform (DCT) domain for copyright protection of images, as digital watermarking chip. Recent improvement in computational world and the proliferation of the Internet have facilitated and demanded the production and distribution of unauthorized copies of copyrighted digital contents. The research work involved simulations and synthesis of VHDL code utilizing recent FPGA families of Xilinx, SPARTEN 3E. It is achieving the most demanding real-time requirements of some standardized frame resolutions and rates. The simulation and Synthesis results for 8-point DCT implementations indicate operating frequencies of 50 MHz, and 60 MHz for Xilinx ISE Environment and functional check using Modelsim 10.1 b software.
Authors and Affiliations
Nirabh Agarwal , Arpit Jain , Prof. Sanjeev Sharma
An Enhanced Scheme for Hiding Text in Wave Files
Abstract: Steganography is a term applied to any number of processes that embed an object into another object in order to deceive any observer or adversary. An embedding algorithm for hiding messages into wave files or a...
Analysis for Diagnosing Myocardial Ischemia by Detecting the Boundary of Left Ventricle in Echocardiography Sequences using GVF snake
Left ventricular performance, one of the hallmarks of coronary artery disease, can be detected by,echocardiography. Coronary artery disease (CAD) also known as myocardial ischemic heart disease (MIHD), is the most common...
Filter-Wrapper Approach to Feature Selection Using PSO-GA for Arabic Document Classification with Naive Bayes Multinomial
Abstract: Text categorization and feature selection are two of the many text data mining problems. In text categorization, the document that contains a collection of text will be changed to the dataset format, the datase...
Corporate Policy Governance in Secure MD5 DataChanges and Multi Hand Administration
Abstract: Policy based management is an administrative approach that simplify the management of a givenendeavor by establishing policies to deal with situation that are likely to occur. Most of the social network andmobi...
Enhancement of Bag-of-Words for Legal documents using Legal Statute
Abstract: In this paper Legal statute related to dowry acts has been processed to obtain a distinct set of legal keywords which don’t have a common occurrence in day to day dowry case judgments. This effort coupled with...