Robust Watermarking by Embedding Watermark in Sorted Mid-frequency Coefficients of Column Transform using DKT-DCT Wavelet
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 7
Abstract
In this paper we introduce a watermarking method which is based on hybrid wavelet transform generated from two orthogonal transforms namely Discrete Kekre Transform and Discrete Cosine transform. As introduced in our previous work, column transform of host and watermark is obtained to make the technique computationally efficient. Watermark is compressed and normalized before embedding to improve imperceptibility of watermarked image. Middle frequency host transform coefficients are used to embed the watermark. Instead of random (row wise) embedment of watermark coefficients into host coefficients, sorting is applied to both coefficients to have a maximum match or minimum difference between them while embedding. Sorting improves the performance of the technique when compared to previous work done without sorting.
Authors and Affiliations
Shachi Natu
A Prototype for the analysis of Conflict resolving Algorithms in Context aware Environment using simulation
In this paper we are proposing a GUI based Prototype for user centered environment like class room, library hall, laboratory, meeting hall, coffee shop, kitchen, living room and bedroom, which recommends useful services...
Microfinance as Employment Generation Tool (Case Study of Pakistan 2001-02 to 2010-11)
The objective of this study is to know the contributions of Micro finance towards employment development through generating employment opportunities to the alit class of urban and rural community. For this purpose quanti...
Ontological Engineering Approach Towards Botnet Detection in Network Forensics
The abundance in the usage of Internet, in every arena of life from social to personal, commercial to domestic and other aspects of life as well, leads the rise in cybercrime at an upsetting speed. More illegal activitie...
Role of Biometric security for The Enhancement of Data Security
In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel...
Stability Aware Routing in Mobile Ad-Hoc Networks using multiple Route
Previous work on routing in MANETs has resulted innumerous routing protocols that aim at satisfying constraints such asminimum hop or low energy. Existing routing protocols often fail todiscover stable routes between sou...