Enviar pesquisa
Carregar
Visible watermarking using spread spectrum
•
0 gostou
•
376 visualizações
IAEME Publication
Seguir
Tecnologia
Arte e fotografia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 7
Baixar agora
Baixar para ler offline
Recomendados
A Review on Airlight Estimation Haze Removal Algorithms
A Review on Airlight Estimation Haze Removal Algorithms
IRJET Journal
Survey on Haze Removal Techniques
Survey on Haze Removal Techniques
Editor IJMTER
F010413438
F010413438
IOSR Journals
IJARCCE 22
IJARCCE 22
Prasad K
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
ijistjournal
A Review on Haze Removal Techniques
A Review on Haze Removal Techniques
IRJET Journal
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
ISAR Publications
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
Recomendados
A Review on Airlight Estimation Haze Removal Algorithms
A Review on Airlight Estimation Haze Removal Algorithms
IRJET Journal
Survey on Haze Removal Techniques
Survey on Haze Removal Techniques
Editor IJMTER
F010413438
F010413438
IOSR Journals
IJARCCE 22
IJARCCE 22
Prasad K
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...
ijistjournal
A Review on Haze Removal Techniques
A Review on Haze Removal Techniques
IRJET Journal
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
ISAR Publications
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
REVIEW ON SECRET IMAGE SHARING USING QR CODE GENERATION TECHNIC
priyanka singh
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
ijtsrd
A0540106
A0540106
IOSR Journals
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
Editor IJMTER
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
IRJET Journal
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
Ijcet 06 09_001
Ijcet 06 09_001
IAEME Publication
Visibility Enhancement of Hazy Images using Depth Estimation Concept
Visibility Enhancement of Hazy Images using Depth Estimation Concept
IRJET Journal
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
LogicMindtech Nologies
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
IRJET Journal
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
csandit
CVGIP 2010 Part 3
CVGIP 2010 Part 3
Cody Liu
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processing
paperpublications3
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
prjpublications
Iw3615491554
Iw3615491554
IJERA Editor
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
IJERA Editor
The single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimation
AVVENIRE TECHNOLOGIES
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
CSCJournals
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET Journal
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
IJECEIAES
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
TELKOMNIKA JOURNAL
50120140506015
50120140506015
IAEME Publication
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
Mais conteúdo relacionado
Mais procurados
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
ijtsrd
A0540106
A0540106
IOSR Journals
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
Editor IJMTER
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
IRJET Journal
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
IAEME Publication
Ijcet 06 09_001
Ijcet 06 09_001
IAEME Publication
Visibility Enhancement of Hazy Images using Depth Estimation Concept
Visibility Enhancement of Hazy Images using Depth Estimation Concept
IRJET Journal
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
LogicMindtech Nologies
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
IRJET Journal
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
csandit
CVGIP 2010 Part 3
CVGIP 2010 Part 3
Cody Liu
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processing
paperpublications3
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
prjpublications
Iw3615491554
Iw3615491554
IJERA Editor
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
IJERA Editor
The single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimation
AVVENIRE TECHNOLOGIES
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
CSCJournals
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET Journal
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
IJECEIAES
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
TELKOMNIKA JOURNAL
Mais procurados
(20)
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
Shadow Detection and Removal using Tricolor Attenuation Model Based on Featur...
A0540106
A0540106
A review-on-digital-image-watermarking-techniques
A review-on-digital-image-watermarking-techniques
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Improved Quality of Watermark Image by using Integrated SVD with Discrete Wav...
Developing and comparing an encoding system using vector quantization &
Developing and comparing an encoding system using vector quantization &
Ijcet 06 09_001
Ijcet 06 09_001
Visibility Enhancement of Hazy Images using Depth Estimation Concept
Visibility Enhancement of Hazy Images using Depth Estimation Concept
A fast single image haze removal algorithm using color attenuation prior
A fast single image haze removal algorithm using color attenuation prior
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
Multi Image Deblurring using Complementary Sets of Fluttering Patterns by Mul...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
CVGIP 2010 Part 3
CVGIP 2010 Part 3
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processing
A novel attack detection technique to find attack in watermarked images with ...
A novel attack detection technique to find attack in watermarked images with ...
Iw3615491554
Iw3615491554
Review on Various Algorithm for Cloud Detection and Removal for Images
Review on Various Algorithm for Cloud Detection and Removal for Images
The single image dehazing based on efficient transmission estimation
The single image dehazing based on efficient transmission estimation
Robust Digital Image-Adaptive Watermarking Using BSS Based
Robust Digital Image-Adaptive Watermarking Using BSS Based
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
Tchebichef image watermarking along the edge using YCoCg-R color space for co...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
An Image Enhancement Approach to Achieve High Speed using Adaptive Modified B...
Semelhante a Visible watermarking using spread spectrum
50120140506015
50120140506015
IAEME Publication
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
50120130406010
50120130406010
IAEME Publication
Wavelet Based Image Watermarking
Wavelet Based Image Watermarking
IJERA Editor
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
ijsrd.com
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
P singh
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
IJERA Editor
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
IOSRJVSP
Digital Image Watermarking Basics
Digital Image Watermarking Basics
IOSR Journals
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET Journal
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
IJERA Editor
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
IAEME Publication
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
International Journal of Technical Research & Application
A130104
A130104
irjes
A130104
A130104
irjes
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
acijjournal
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
IRJET Journal
Generic lossless visible watermarking—a
Generic lossless visible watermarking—a
Agnianbu Wrong
20120140505013
20120140505013
IAEME Publication
Semelhante a Visible watermarking using spread spectrum
(20)
50120140506015
50120140506015
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
Reversible Image Watermarking Based on Histogram Shifting Technique
50120130406010
50120130406010
Wavelet Based Image Watermarking
Wavelet Based Image Watermarking
Comparison of Wavelet Watermarking Method With & without Estimator Approach
Comparison of Wavelet Watermarking Method With & without Estimator Approach
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
SIGNIFICANCE OF RATIONAL 6TH ORDER DISTORTION MODEL IN THE FIELD OF MOBILE’S ...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Digital Image Watermarking Basics
Digital Image Watermarking Basics
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
A Survey and Comparative Study on Video Watermarking Techniques with Referenc...
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
A130104
A130104
A130104
A130104
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
Digital Image Watermarking using Discrete Wavelet Transform
Digital Image Watermarking using Discrete Wavelet Transform
Generic lossless visible watermarking—a
Generic lossless visible watermarking—a
20120140505013
20120140505013
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Último
(20)
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Visible watermarking using spread spectrum
1.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 108 VISIBLE WATERMARKING USING SPREAD SPECTRUM Nikhat Nawaz, Asso.prof, Dept of ECE, Ayaan College of Engg & Tech G.Prasanna Lakshmi, Research Scholar,Gitam University, Syed Saifuddin, Asst.prof, Dept of ECE, Ayaan College of Engg & Tech Altaf.C, Asst.Prof, Dept of ECE, Ayaan College of Engg & Tech ABSTRACT: A method of visible watermarking with lossless recovery has been proposed in this paper using spread spectrum. This method makes use of one-to-one compound mappings of image pixel values which is used to embed a variety of visible watermarks of different sizes on cover images. The compound mappings method is reversible, thus provides lossless recovery of original image from watermarked images. Different types of visible watermarks like opaque, monochrome and translucent are embedded in this paper. A monotonically increasing compound mapping is created which are more distinctive visible watermarks in the watermarked image. Index Terms: Lossless recovery, visible watermarking, mapping, reversible, opaque, monochrome, one-to-one compound mapping, translucent 1. INTRODUCTION The cost effectiveness of software selling and high quality art work which are in the form of digital images and video sequences, which are transmitted over World Wide Web (www) are highly enhanced, consequent to the improvement of technology. Though the commercial exploitation of the www is steadily being more appreciated, apprehension on the Security aspect of the trade has only funneled the exploitation to be restricted to the transmission of demo and free versions of software and art. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. To address these growing concerns various software products have been introduced. It should be possible to hide data (information) within digital audio, images and video files. The data (information) is hidden in the sense that it is perceptually and statistically undetectable [3]. The way to protect multimedia images against illegal recording and retransmission is embed a small signal in the form of text or image, called digital signature or watermark that characterizes the ownership and marks it as his intellectual property. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 3, April 2013, pp. 108-114 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
2.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 109 Watermarking techniques are particular embodiments of Stegnography [2]. Digital Watermarking is the solution to the need to provide value added protection on top of data encryption and scrambling for content protection [4]. Watermarking is the process that embeds data called a watermark or digital signature or tag or label into a multimedia object such that watermark can be detected or extracted later. Digital watermarking methods for images are usually of two types: invisible and visible. Visible watermarking is generally clearly visible after common image operations are applied. The visible watermarks convey ownership information directly on the media and can deter attempts of copyright violations. Embedding of watermarks, either invisible or visible, degrade the quality of the host media in general. The techniques of reversible watermarking [8]–[12], allow legitimate users to remove the embedded watermark and restore the original content. But mostly the reversible watermarking techniques do not guarantee lossless image recovery, i.e. the recovered image is identical to the original image. Lossless recovery is important in many applications where serious concerns about image quality arise. II) SPREAD SPECTRUM COMMUNICATION The watermark should not be placed in perceptually insignificant regions of the image or its spectrum since many common signals and geometric processes attack these components. For example, a watermark in the high frequency spectrum of an image can be easily eliminated with little degradation to the image by any process that directly or indirectly performs low pass filtering. The major problem is to insert a watermark into the most significant regions of a spectrum. Clearly, any spectral coefficient can be changed, provided such modification is small. But very small changes are susceptible to noise [3]. To solve this problem, the frequency domain of image is a communication channel, and the watermark acts as a signal that is transmitted through it. Attacks and signal distortions can be treated as noise that the immersed signal must be immune to. Thus, the watermarking can be considered as an application of spread spectrum communications. In spread spectrum communication, a narrow band signal over a much larger bandwidth such that the signal energy present in any single frequency is imperceptible. Hence, the watermark is spread over many frequency bins so that the energy in any one bin is very small and certainly undetectable. Since the watermark verification process knows the location and context of the watermark, it is possible to concentrate these weak signals with a high signal to noise ratio (SNR). However, to destroy such a watermark we would require noise of high amplitude to be added to all frequency bins. Spreading of the watermark throughout the spectrum of an image ensures a large measure of security against unintentional or intentional attack. First the spatial location of the watermark is not obvious, and also the frequency regions should be selected in a fashion that ensures severe degradation of the original data following any attack on the watermark. III) Existing methods Many lossless invisible watermarking techniques have been proposed in the past. The common approach is to compress a portion of the original host and then embed the compressed data together with the intended payload into the host [8]. Another approach is to superimpose the spread- spectrum signal of the payload on the host so that the signal is detectable and removable. Another approach is the manipulation of a group of pixels as a unit to embed a bit of information. Though it is possible to use lossless invisible techniques to embed removable visible watermarks, due to the low embedding capacities of these techniques there is no possibility of implanting large-sized visible watermarks into the host. In case of lossless visible watermarking, a common approach is to embed a monochrome watermark using deterministic and reversible mapping of pixel values or DCT coefficients in the watermark region. Another approach is to rotate consecutive watermark pixels to embed a visible watermark. An advantage of these approaches is that watermarks of any sizes can be embedded into any host image. But, only binary visible watermarks can be embedded using these techniques, which is restrictive since most logos are colourful.
3.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 110 IV) PROPOSED METHOD This paper proposes a new method for lossless visible watermarking using compound mapping, through which mapped values can be controlled. The mappings are reversible for lossless recovery of the original image. The technique leads to the possibility of embedding different types of visible watermarks into cover images. The original image can be recovered from a resulting watermarked image by using the corresponding reverse mappings without any loss. Algorithm for Lossless Watermarking: Let Input image be I and let the watermark image be W then the Output watermarked image is WL. Steps to Implement: 1. Select any set of pixel values p from input Image I and let L be the watermark to be embedded, then WA is called the watermarking area. Also let the set of pixels in P in WL be R. 2. For each pixel x with value p in WA and let the corresponding pixel in B be Y and the value of the corresponding pixel in Y as L as l , and then apply the following steps: a) An estimation technique is applied to get a value close to the values of the neighbouring pixels (excluding it). b) Set b = l. c) Map p to a new value by using the below formula d) Set the value of Z to R e) Set the value of each pixel in L, which is outside the region WA such that it is equal to that of the corresponding pixel in I. Cover Image Watermark Image Watermarked Image
4.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 111 Algorithm: Generic Watermark Removal for Lossless Image Recovery (decoding): Here the input is a watermarked image WL, and L is the watermark then the recovered output image is B. Steps: a) Select a watermarking area Q in WL. b) Set the value of each pixel in B , which is outside the region R, such that it is equal to corresponding pixel in WL. c) For each pixel z with value q in R, let the corresponding pixel in the recovered image B be A and the value of the corresponding pixel y in L be l, d) Obtain the value derived in Step 3 of Algorithm 1 by applying the estimation technique. Watermark Image Cover Image Decoded Output Monochrome Watermarking: Let Input image be I and let the watermark image be L then the Output watermarked image is WL. Steps: a) Select any watermarking area WA which is the set of pixels corresponding spatially to those in L with no transparency (with alpha values larger than zero). b) Denote the set of pixels corresponding to P as Q. c) For each pixel x with value p in A, let the corresponding pixel in R be Z and the value of the corresponding pixel Y in L is l, and then apply the following steps. 1) A neighbour based parameter is set which estimates the colour value by using colours of neighbouring pixels. 2) Get this parameter with alpha blending according to the formula 3) Map this value to a new value 4) Set the value of z to be s. d) Set the value of each pixel in WL, which is outside the region WA, to be equal to the corresponding pixel in I.
5.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 112 Cover Image Watermark Image Watermark converted to binary image Watermark and Watermark dash Translucent watermarking: Let Input image be I and let the watermark image be L then the Output watermarked image is WL. Steps: a) Select the watermarking area WA as the set of pixels corresponding spatially to those in L which are not transparent (with alpha values larger than zero). b) Let the set of pixels corresponding to WA in WL as R. c) For each pixel X with value p in WA, let the corresponding pixel in R be z and the value of the corresponding pixel Y in L be l, then apply the following steps. 1) A neighbour based parameter is set which estimates the colour value by using colours of neighbouring pixels. 2) Gets this parameter with alpha blending according to the formula .
6.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 113 3) Map this value to a new value using 4) Set the value of z to be q 5) Set the values of the remaining pixel in WL, which are outside the region WA to the corresponding pixel in I. Cover Image Watermark Image Translucent Watermarked Image V) CONCLUSION In this paper, a new method for visible watermarking with lossless image recovery has been proposed. This paper uses one-to-one compound mapping that maps image pixel values to the desired visible watermarks. This allows different visible watermarks to be embedded and an example has been presented for embedding opaque and monochrome watermarks as well as translucent full-colour watermarks. A translucent watermark is clearly visible which is more appropriate than traditional transparent watermarks in applications like advertising, copyright protection. Experimental results have show that the proposed system is more feasible and effective.
7.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 3, April (2013), © IAEME 114 VI) REFERENCES [1] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” presented at the European Signal Processing Conf., Tampere, Finland, and Sep. 2000 [2] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding. Steganog- raphy and Watermarking— Attacks and Countermeasures. Boston, MA: Kluwer, 2001. [3] M. Awrangjeb and M. S. Kankanhalli, “Lossless watermarking con- sidering the human visual system,” presented at the Int. Workshop on Digital Watermarking, Seoul, Korea, and Oct. 2003 [4] M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, “Adaptive visible watermarking of images,” in Proc. IEEE Int. Conf. Multimedia Computing and Systems, 1999, vol. 1, pp. 568–573. [5] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673– 1687, Jun. 1997. [6] Y. Hu and S. Kwong, “Wavelet domain adaptive visible watermarking,” Electron. Lett., vol. 37, no. 20, pp. 1219–1220, Sep. 2001. [7] G. Braudaway, K. A. Magerlein, and F. Min t zer, “Protecting publicly available images with a visible image watermark,” in Proc. SPIE Int. Conf. Electronic Imaging, Feb. 1996, vol. 2659, pp. 126– 133. [8] Y. J. Cheng and W. H. Tsai, “A new method for copyright and integrity protection for bitmap images by removable visible watermarks and irremovable invisible watermarks,” presented at the Int. ComputerSymp.—Workshop on Cryptology and Information Security, Hualien, Taiwan, R.O.C., Dec. 2002. [9] P. M. Huang and W. H. Tsai, “Copyright protection and authentication of grayscale images by removable visible watermarking and invisible signal embedding techniques: A new approach,” presented at the Conf. Computer Vision, Graphics and Image Processing, Kinmen, Taiwan, R.O.C., Aug. 2003. [10] Y. Hu and B. Jeon, “Reversible visible watermarking and lossless re- covery of original images,” IEEE Trans. Circuits Syst. Video Technol.,vol. 16, no. 11, pp. 1423–1429, Nov. 2006. [11] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul.1999. [12] B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” presented at the European Signal Processing Conf., Tampere, Finland, and Sep. 2000. [13] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, “A DCT Domain visible watermarking technique for images,” in Proc. IEEE Int. Conf. Multimedia and Expo, Jul. 2000, vol. 2, pp. 1029–1032. [14] C. de Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular interpretation of objective transformations in lossless watermarking for media asset management,” IEEE Trans. Multimedia, vol. 5, no. 1, pp. 97–105, Mar. 2003. [15] J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—New paradigm in digital watermarking,” J. Appl. Signal Process., vol. 2002,no. 2, pp. 185–196, Feb. 2002. [16] M. Awrangjeb and M. S. Kankanhalli, “Reversible watermarking using a perceptual Model,” J. Electron. Imag, vol. 14, no. 013014, Mar. 2005. [17] Y. Hu, S. Kwong, and J. Huang, “An algorithm for removable visible watermarking,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 1, pp. 129–133, Jan. 2006. [18] Fahd N. Al-Wesabi, Adnan Z. Alsakaf And Kulkarni U. Vasantrao, “A Zero Text Watermarking Algorithm Based On The Probabilistic Patterns For Content Authentication Of Text Documents” International Journal of Computer Engineering & Technology (IJCET) Volume 4, Issue 1, 2013, pp. 284 - 300, ISSN PRINT : 0976 – 6367, ISSN ONLINE : 0976 – 6375. [19] Mr. N. R. Bamane, Dr. Mrs. S. B. Patil, Prof. B. S. Patil and Prof. R. K. Undegaonkar, “Hybrid Video Watermarking Technique By Using Dwt & Pca”International Journal Of Electronics And Communication Engineering &Technology (IJECET) Volume 4, Issue 2, 2013, pp. 172 - 179, ISSN PRINT : 0976- 6464, ISSN ONLINE : 0976 –6472.
Baixar agora