“Robust Video Watermarking using Discrete Cosine Transform and Third level Discrete Wavelet Transform”
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 10
Abstract
Digital watermarking technique is becoming popular for copyright information. The watermark embedded in the digital video may be incorrectly detected and extracted due to lack of appropriate algorithm, so the main concern is to implement the algorithm which is more resistant to different types of attacks. In this paper, a Hybrid video watermark technique has been introduced where DCT and 3 rd level of DWT, for adding more security, is used. PSNR, MSE and NC values of Hybrid technique are analyzed on the basis of different noises and attacks. Hybrid technique is robust against high stream, low stream, frame drop, frame trim attacks.
Authors and Affiliations
Chitrasen . , Tanuja Kashyap
Framework for Application Service Behavior Prognostication with Cost-Effective Provisioning In a Utility Cloud
In A Utility Cloud Resources Are Operating On A Utility Basis That Allows Customers To Pay As They Go And Only For The Resources They Will Use At Multiple Granularities For A Specified Level Of Quality Of Service. Cloud...
A Bivariate Exponential distribution model for growth hormone response to repeated maximal cycle ergometer exercise at different pedaling rates.
In this paper, we introduce the bivariate exponential distribution model approach to probability modeling. Our results leads to exponential model characterization of many well known life time model to the development of...
Sustainability of Solid Waste Management System in Urban Areas of Pakistan: Stakeholders Perspective
Sustainability of solid waste management system in Pakistan like other developing countries is a growing challenge. Stakeholders are vital for the successful running of solid waste management system and timely inclusion...
Energy Savings In Air Heating Stove Of Tea Plant Using Repetitive Control Strategy
Many of the production costs for producing tea are attributable to the process of drying the tea. Automation of this process can assist companies to reduce these production costs by making crucial information at right ti...
Emoji Pins
This paper explains how Security in ATM networks is necessary because ATM is wide-spread and many areas such as financial or medical applications, network administration, etc. require very sensitive handling of the trans...