Virtual Watermarking for Color images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
This work proposes a virtual watermarking technique for colored images. In the proposed work, sender uses two images one is cover image and other is secret image. Let us consider the secret image to be embedded as sub image and the cover image as master image. The master image is chosen such that it iscommon to both sender and receiver such as Lena image which is used in most of the image processing projects. In the first phase of the project an index array is derived by applying virtual watermarking process on bothmaster and sub image. Once the index array is obtained, the same is encrypted using an encryption key. The encrypted index array along with the encryption key is sent to the receiver. In the second phase, the receiver side decrypts the index array using the key. Once the index array is obtained reverse virtual watermarking is applied on index array and common master image. At the end of this process the original sub image is obtained back. The main advantage of this technique is that master image is not transmitted, hence providing more protection against image processing attacks
Authors and Affiliations
Ms. Rakshitha , , Ms. Sharanya P. S
Digital Image Forgery Detection by Contrast Enhancement
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...
Glaucoma Detection Using Enhanced K-Strange Points Clustering Algorithm and Classification
Glaucoma is an eye disorder that majorly affects the optic nerve head in the retina. The damage caused to optic disc leads to gradual loss of peripheral vision which may further result in complete blindness. Glaucoma can...
Bridging Socially Enhanced Virtual Communities
As technologies required for collaborative computing grow, there are business collaborations among companies carrying out related business. The communication and interactions across the companies has become a com...
Comparative Study of Clustering Algorithms Used in CounterTerrorism
Abstract: Data mining can be used to model crime detection problems, detect unusual patterns, terroristactivities and fraudulent behaviour. We will look at k-means clustering with some enhancements to aid in thepro...
Monitoring Wireless Sensor Network using Android based Smart Phone Application
Abstract: Wireless Sensor Network application’s is use in detection of natural calamities like forest fire detection, flood detection, , earth quick early detection ,snow detection, traffic congestion and various o...