Robust Invisible Watermarking Using OSTU Method and DWT
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2
Abstract
In this work we have devised the invisible watermarking using Haar wavelet function and otsu segmentation. Here we have contributed by providing a threshold parameter to binarise message image using ostu’s method and analysing a new formulation for Normalised Coefficient parameter. As all watermarking consists of two units i.e. embedding and extracting. In this we also calculate the five parameters i.e. contrast, dissimilarity, homogeneity, angular momentum and entropyee of cover image and message image.
Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools
"The growth in Information Technology has led to the transformation of the banking system towards providing efficient services while simultaneously being time and cost effective. This led to the introduction of the cashl...
Accuracy of Color Duplex Imaging (CDI) in Diagnosis Deep Vein Thrombosis(DVT) versus Clinical Prediction Index
"Several diagnostic strategies using Color Duplex Imaging (CDI) and Clinical Prediction Rules in diagnosis deep-vein thrombosis,. The purpose of this review is to discuss the utility of Color Duplex Imaging (CDI) for dia...
Comparison of Advanced Optimization Algorithm for Task Scheduling in Cloud Computing
In this paper, the algorithmic concepts of the CucKoo-search (CK), Particle Swarm Optimization (PSO), Differential Evolution (DE), and Artificial Bee Colony (ABC), algorithms have been analyzed. The mathematical optimiza...
Estimates of Growth of Agricultural Sector in East Africa Pastoral Regions: Evidence from Ethiopia (Afar Regional State)
Employing commonly used national account estimation methodology we find livestock sub sector contributed the greatest share to the agricultural regional Real Gross Domestic Product which is 88.40 percent in 2010/11 and...
An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects
Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and it is important that communication be made secret. As a result, the security of information pass...