WAVELET BASED WATERMARKING ON DIGITAL IMAGE
Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 2
Abstract
Safeguarding creative content and intellectual property in a digital form has become increasingly difficult as technologies, such as the internet, broadband availability and mobile access advance. It has grown to be progressively easier to copy, modify and redistribute digital media, resulting in great declines in business profits. Digital watermarking is a technique which has been proposed as a possible solution to this problem. Digital Watermarking is a technology which is used to identify the creator, owner, distributor of a given video or image by embedding copyright marks into the digital content, hence digital watermarking is a powerful tool used to check the copy right violation. In this paper a robust watermarking technique based on DWT (Discrete Wavelet Transform) is presented. In this technique the insertion and extraction of the watermark in the grayscale image is found to be simpler than other transform techniques. This paper successfully explains the digital watermarking technique on digital images based on discrete wavelet transform by analyzing various values of PSNR’s and MSE’s..
Authors and Affiliations
AKHIL PRATAP SINGH , AGYA MISHRA
Fuzzy Cluster Quality Index using Decision Theory
stering can be defined as the process of grouping physical or abstract objects into classes of similar objects. It’s an unsupervised learning problem of organizing unlabeled objects into natural groups in such a way obje...
AN PROFICIENT LS BASED SWITCHED PREDICTOR FOR LOSSLESS CONFINING OF 4-D MEDICAL
Techniques for medical imaging like fMRI, CT, MRI produces large amount of digital data. This paper proposes a context based LS based predictors for lossless compression of such 4-D images. Redundancy in the form of smoo...
ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER
In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goa...
BYZANTINE FAULT TOLERANCE MODEL FOR SOAP FAULTS
The proposed model is to configure Byzantine Fault Tolerance mechanism for every SOAP fault message that is transmitted. The reliability and availability are of major requirements of Web services since they operate in th...
RANK LEVEL FUSION USING FINGERPRINT AND IRIS BIOMETRICS
Authentication of users is an essential and difficult to achieve in all systems. Shared secrets like Personal Identification Numbers (PIN) or Passwords and key devices such as Smart cards are not presently sufficient in...