Review on Binary Image Steganography and Watermarking
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 11
Abstract
In this paper we have reviewed and analyzed different watermarking and steganography techniques. This is based on image processing in spatial and transform domain. We have reviewed different techniques like data hiding by employing pairs of contour edge patterns, edge pixels, visual distortion tables, visual quality preserving rules, substitution, fixed partitioning of images, run lengths in spatial and using Discrete Cosine Transform, Discrete Wavelet Transform in transform domain. We have also represented analysis of these techniques in the form of table considering different factors of watermarking and steganography like visual quality, embedding capacity, security, robustness and computational complexity. It is concluded that spatial domain techniques are best with some factors like visual quality, while transform domain are best for some factors like robustness against attacks or other image processing operations and security. The data hiding capacity and computational complexity are common factors for both the domains.
Authors and Affiliations
Mrs. Gyankamal J. Chhaje , Ms. Krupali V. Deshmukh , Ms. Trupti S. Kulkarni
A Systematic Approach for Constructing Static Class Diagrams from Software Requirements
The trend towards the use of object-oriented methods for software systems development has made it necessary for the use of object-oriented approaches in object-oriented software systems development. Class diagrams repres...
Music Controller based on Hand Gestures using Webcam
Interaction of human beings with computers can be done without any physical interface and this can be done using gestures. The paper addresses a solution to access the music player in the computer via the webcam. This pa...
A Survey on Hadoop Assisted K-Means Clustering of Hefty Volume Images
The objects or the overview of the objects in a remote sensing image can be detected or generated directly through the use of basic K-means clustering method. ENVI, ERDAS IMAGINE are some of the software that can be used...
Prediction of Rainfall Using Backpropagation Neural Network Model
Agriculture is the predominant occupation in India, accounting for about 52% of employment. The Irrigation acilities are nadequate, as revealed by the fact that only 52.6% of the land was irrigated in 2009–10 which res...
WEIGHTAGE FACTOR BASED SCHEME FOR PERFORMANCE IMPROVEMENT IN AD HOC NETWORKS
Ad-hoc networks are a new wireless networking paradigm for mobile hosts. Ad hoc networks don’t require any fixed infrastructure such as base stations or mobile switching centers. Node mobility in an ad-hoc network causes...