Comparative study about Digital Image Watermarking Using DCT and robustness testing of technique
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
In the today’s world of rapidly growing internet services (Commercial and educational), security always comes in picture even at low level. Same way in the field of Information Technology and Computer Science and Engineering, security is always the first requirement. If we take an example of audio, video, images in which sometimes it is required to prove our ownership, to secure our data or information some means of security is always required. So, this paper illustrates ideas for making our own images to be secured from unauthorized persons, which can also be applied to videos and audios in terms. The process of making changes into images to secure it is called “IMAGE WATERMARKING”. There are various ways to watermark images. The concept, considered in this paper is to hide image (watermark) behind cover image (which needs to be owned) and this concept is explained using DCT [Discrete Cosine Transform].In which both, cover image and watermark image, are converted in DCT forms. Then watermark image is embedded into cover image. Finally, IDCT [Inverse Discrete Cosine Transform] is applied on DCT formed watermarked cover image to get watermarked image in which watermark is invisible. To check the effect we can try to extract watermark from watermarked image and we can notice similarities between original watermark and extracted one. Then to check robustness of this watermarking technique we can apply some attacks on watermarked image and then we can extract watermark from it to check similarities between original watermark and extracted one using PSNR[Pick Signal to Noise Ratio]values.
Authors and Affiliations
Priyanka Dashrathsinh Puvar , Amar D. Puvar
WEB APPLICATION SECURITY - CROSS-SITE REQUEST FORGERY ATTACKS
Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...
Implementation of Multicloud Computing Deployment System of SAAS & IAAS for Effective Resource Utilization on MTC Application
Cloud computing is gaining acceptance in several IT organizations. In this paper, we have a tendency to explore this state of affairs to deploy a computing cluster on the highest of a multi cloud infrastructure, for reso...
A Review of various statestical methods for Outlier Detection
Outlier Detection has many applications. Outlier is instance of the data set which has exceptional characteristics compare to other instance of data and exhibits unusual behavior of the system. There are many methods use...
A Survey on Hidden Markov Model for IT Service Management
Network management refers to the actions, techniques, proceedings, and tools that are related to the process, governance, upholding, and stipulating of networked systems. Network management is vital to rule and manage pr...