Robust Watermarking by Embedding Watermark in Sorted Mid-frequency Coefficients of Column Transform using DKT-DCT Wavelet
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 7
Abstract
In this paper we introduce a watermarking method which is based on hybrid wavelet transform generated from two orthogonal transforms namely Discrete Kekre Transform and Discrete Cosine transform. As introduced in our previous work, column transform of host and watermark is obtained to make the technique computationally efficient. Watermark is compressed and normalized before embedding to improve imperceptibility of watermarked image. Middle frequency host transform coefficients are used to embed the watermark. Instead of random (row wise) embedment of watermark coefficients into host coefficients, sorting is applied to both coefficients to have a maximum match or minimum difference between them while embedding. Sorting improves the performance of the technique when compared to previous work done without sorting.
Authors and Affiliations
Shachi Natu
Secured Data Transmission Using Wavelet Based Steganography And Cryptography
Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding i...
USING MIXED METHOD APPROACH TO UNDERSTAND ACCEPTANCE AND USAGE OF ICT IN NIGERIAN PUBLIC UNIVERSITY
Technology acceptance is about how people accept andadopt some technology to use. The primary target ofmany technology acceptance studies is to examine how toencourage usage and also analyze what interruptsacceptance and...
Air pollution monitoring By sensors embedded on mobile phone
Mobile technology has been available for at least a decade and is increasingly being used in developing countries as away of contacting and connecting citizens and helping them to organize for a better life.Mobile phones...
Using Fuzzy Logic in Robot Navigation to Find Animals
 Fuzzy logic is a tool to use human expertise. The simplicity of fuzzy-rule based systems and its power to perform various tasks without accurate measurement and computation makes it very popular between sciences. One o...
A Novel Method for Intrusion Detection Based on SARSA and Radial Bias Feed Forward Network (RBFFN)
The Internet, computer networks and information are vital resources of current information trend and their protection has increased importance in current existence. Any attempt, successful or unsuccessful to finding the...