Virtual Watermarking for Color images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
This work proposes a virtual watermarking technique for colored images. In the proposed work, sender uses two images one is cover image and other is secret image. Let us consider the secret image to be embedded as sub image and the cover image as master image. The master image is chosen such that it iscommon to both sender and receiver such as Lena image which is used in most of the image processing projects. In the first phase of the project an index array is derived by applying virtual watermarking process on bothmaster and sub image. Once the index array is obtained, the same is encrypted using an encryption key. The encrypted index array along with the encryption key is sent to the receiver. In the second phase, the receiver side decrypts the index array using the key. Once the index array is obtained reverse virtual watermarking is applied on index array and common master image. At the end of this process the original sub image is obtained back. The main advantage of this technique is that master image is not transmitted, hence providing more protection against image processing attacks
Authors and Affiliations
Ms. Rakshitha , , Ms. Sharanya P. S
Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Sma...
Intrusion Detection system: A Review of the state of the art
Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this...
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter Based NEDA Technique
In this paper, we describe an efficient Xilinx Virtix4 discrete wavelet transform (DWT) using 9/7 filter based new efficient distributed arithmetic (NEDA) Technique. We demonstrate that NEDA is a very efficie...
An Effective Method to Hide Texts Using Bit Plane Extraction
Abstract: The work is to show how simply a data can be hidden inside an image and be easily extracted usingMatlab. The work focuses on bit plane extraction and how it can be used to complete the above mentioned tas...
MAC Protocols: A Review
Mobile adhoc networks (MANETS) are infrastructureless networks which uses radio signals, to establish communication among mobile nodes. MANET media is open shared media, multiple mobile nodes may access the...