Robust Watermarking Framework with DCT Based Encryption
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 5, Issue 5
Abstract
Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission time, information compression is required. If you take benefit from the character of cryptographic schemes and digital watermarking, the copyright of multimedia contents can possibly be well protected. Our objective will be to give access to the outcomes of one's image integrity and of their origin regardless of the fact that the reputation is stored encrypted. If watermarking and encryption are conducted jointly for the protection stage, watermark extraction and decryption might be applied independently. With the source end original image and watermarked encrypted image is processed. This encrypted watermark image is finally decoded at the receiver end. This proposed work proposes a novel encryption algorithm to encrypt image. The entropy of this very watermarked image and correlation coefficient of extracted watermark image is amazingly not far away from ideal values, proving the correctness of proposed algorithm. In the proposed system, a Watermarking Scheme based on DWT with encryption algorithm, will be developed to improve the robustness and protection along with security. Also experimental results show resiliency of a given scheme against large blurring attack like mean and Gaussian filtering, linear filtering Thus proving the security, effectiveness and robustness of a given proposed watermarking algorithm.
Authors and Affiliations
L. Sri Lakshmi , Mrs. SK. Salma Begum
A Support Vector Machine and Information Gain based Classification Framework for Diabetic Retinopathy Images
Image mining is the process of applying data analysis and discovery algorithms over large volume of image data. It has especially become popular in the fields of forensic sciences, fraud analysis and health care, for it...
Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems
Metacafe is one of the most popular video sharing system among all online video sharing systems, these video sharing systems provide features that allow users to post a video as a response to the topic that is being disc...
An Effective Method of Eye Detection Using Segmentation and Projection
Face detection and eye detection has long been the subject of interest in practical implementation of image processing and vision. Moreover the exact pupil detection of eye is the cream of research as the basic step of r...
Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...
Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing
Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and con...