Survey paper on Copyright Protection for Images on Mobile Devices
Journal Title: International Journal on Computer Science and Engineering - Year 2014, Vol 6, Issue 4
Abstract
The upcoming era of mobile technology has also raised by sharing of images and other graphical data. With this protection to such files is also plays a vital role. Using watermarking we can guarantee to provide the ownership for these shared images. There are various techniques to provide digital watermarking introduced by different inventors. The results of these existing techniques are quite well but the unification of these techniques can be a better solution.
Authors and Affiliations
Ashwini Suryawanshi , Shraddha Newase , Minal Chachare , Sheetal Dudhane
Speech Volume Monitor for Hearing Impaired
Hearing impaired can be classified into people who were affected by birth and those who developed the problem at a later stage. The second category knows how to speak but cannot hear them. They encounter embarrassment by...
An Analysis of Particle Swarm Optimization with Data Clustering-Technique for Optimization in Data Mining.
Data clustering is a popular approach for automatically finding classes, concepts, or groups of patterns. Clustering aims at representing large datasets by a fewer number of prototypes or clusters. It brings simplicity i...
Dynamic Steering Control of Battery Operated Car for Lane Keeping using Image Sensor
This project presents simple prototype for driving automation of battery operated cars. The system consists of Decision Making Unit (DMU) & Control System Unit (CSU) to implement decision given by DMU. DMU performs t...
Solution for Vehicles Noise Cancellation With Modification of LMS Adaptive Algorithm
The problems of noise cancelling systems are based on the specific characteristics of their sources. Therefore, the knowledge of each noise source should be represented prior to the excecution of the designed noise cance...
A Proposed Encoding and Hiding Text in an Image by using Fractal Image Compression
The problem of protecting data and information originates from the dependency upon encryption and steganography separately. Therefore, it is easy to break them and detecting the contents of the secret massages available...