Review on Binary Image Steganography and Watermarking
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 11
Abstract
In this paper we have reviewed and analyzed different watermarking and steganography techniques. This is based on image processing in spatial and transform domain. We have reviewed different techniques like data hiding by employing pairs of contour edge patterns, edge pixels, visual distortion tables, visual quality preserving rules, substitution, fixed partitioning of images, run lengths in spatial and using Discrete Cosine Transform, Discrete Wavelet Transform in transform domain. We have also represented analysis of these techniques in the form of table considering different factors of watermarking and steganography like visual quality, embedding capacity, security, robustness and computational complexity. It is concluded that spatial domain techniques are best with some factors like visual quality, while transform domain are best for some factors like robustness against attacks or other image processing operations and security. The data hiding capacity and computational complexity are common factors for both the domains.
Authors and Affiliations
Mrs. Gyankamal J. Chhaje , Ms. Krupali V. Deshmukh , Ms. Trupti S. Kulkarni
DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA
The problem of distributed data mining isvery important in network problems. Ina distributed environment (such as a sensor or IP network), one has distributed probes placed at strategic locations within the network. The...
Learning Approaches toward Title Word Selection on Indic Script
Title is a compact representation of a document which distill the important information from the document. In this paper we studied the selection words as title words by using different learning approaches namely nearest...
Brassinosteroid synthesis as context sensitive language acceptance problem
A biochemical system like brassinosteroid biosynthesis is not just an assembly of enzymes. In addition to the listing of the individual components, it is essential to understand how individual components dynamically inte...
Fingerprint Verification System Using Support Vector Machine
Efficient fingerprint verification system is needed in many places for personal identification to access physical facilities, information etc. This paper proposes robust verification system based on features extracted fr...
An Agent Based Simulation Model for Warning Messages Dissemination in a Vehicular Ad hoc Network
Since the safety on roads has become a main concern for both governments and car manufacturers in the last twenty years, number of applications into the domain of vehicular communication is proposed. Vehicular Ad hoc Net...