Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 1
Abstract
A novel watermarking scheme for color images has been proposed using column DCT wavelet transform. To improve the robustness of watermarking scheme, compressed watermark with tolerable fidelity is embedded into host image. Middle frequency coefficients are selected for embedding watermark so that the proposed scheme can sustain attacks like lossy image compression where high frequency coefficients are eliminated from watermarked image. Performance of proposed scheme is evaluated against image resizing, varieties of cropping, compression and noise attacks like binary distributed and Gaussian distributed run length noise. Due to column transform instead of full transform, proposed scheme also gives computational efficiency.
Authors and Affiliations
H. B. Kekre , Tanuja Sarode , Shachi Natu
Implementation Challenges of an Enterprise System and Its Advantages over Legacy Systems
This paper explores the implementation challenges of Enterprise Resource Planning in the industry and its advantages over legacy systems. The paper depicts the historical background of ERPs and their significance in faci...
SIMULATION BASED PLANNING FOR DESIGN OF WASHING MACHINE USING H/W & S/W CO DESIGN
A simulator is designed and developed for helping embedded system development team to plan their time schedule, work flow etc. and distribute human resources and their efforts over various phases of washing machine devel...
MEASURING THE QUALITY OF OBJECT ORIENTED SOFTWARE MODULARIZATION DEFINING METRICS AND ALGORITHM
We proposed a System to measure the quality of modularization of object-oriented software system. Our work is proposed in three Parts as follows: MODULE 1: DEFINING METRICS FOR OBJECT ORIENTED SOFTWARE AND ALGORITHM M...
New Design of Crypto-Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher
Random Number Generators (RNGs) are an important building block for algorithms and protocols in cryptography. Random number generation is used in a wide variety of cryptographic operations, such as key generation and cha...
Reduction of Error in Handoff Initiation Time Calculation for Next-Generation Wireless Systems
Recent research in wireless communications technologies has focused to the development of Next-generation wireless ystems (NGWS) which integrate various existing wireless networks technologies, each of which is optimize...