Digital Image Watermarking Technique Based on Different Attacks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 4
Abstract
Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party. With a lot of information available on various search engines, to protect the ownership of information is a crucial area of research. In recent year, several digital watermarking techniques are presented based on discrete cosine transform (DCT), discrete wavelets transform (DWT) and discrete fourier transforms (DFT). In this paper, we proposed an algorithm for digital image watermarking technique based on singular value decomposition; both of the L and U components are explored for watermarking algorithm. This technique refers to the watermark embedding procedure and watermark extracting procedure. Digital image watermarking techniques for copyright protection is robust. The experimental results prove that the quality of the watermarked image is good and that there is strong resistant against many attacks. The image watermarking techniques help to achieve artificial intelligence. Digital image watermarking is the most effective solution in this area and its use to protect the information is increasingly exponentially day by day.
Authors and Affiliations
Manjit Thapa , Dr. Sandeep Kumar Sood , A. P Meenakshi Sharma
Design of Linear Time Varying Flatness-Based Control for Single-Input Single-Output Systems
In this paper, the control of linear discrete-time Varying Single-Input Single-Output systems is tackled. By using flatness theory combined with a dead-beat observer, a two degree of freedom controller is designed with h...
An Ontology- and Constraint-based Approach for Dynamic Personalized Planning in Renal Disease Management
Healthcare service providers, including those involved in renal disease management, are concerned about the planning of their patients’ treatments. With efforts to automate the planning process, shortcomings are apparent...
Evaluating a Cloud Service using Scheduling Security Model (SSM)
The development in technology makes cloud com-puting widely used in different sectors such as academic and business or for a private purposes. Also, it can provide a convenient services via the Internet allowing stakehol...
ACCEPTANCE OF WEB 2.0 IN LEARNING IN HIGHER EDUCATION: A CASE STUDY NIGERIA
Technology acceptance has been studied in different perspectives. Though a few empirical studies on acceptance of Web 2.0 as a social networking tool in teaching and learning exist, none of such studies exist in Nigeria...
Improvement on Classification Models of Multiple Classes through Effectual Processes
Classify cases in one of two classes referred to as a binary classification. However, some classification algorithms will allow, of course the use of more than two classes. This research work focuses on improving the res...