Randomized LSB Hiding Algorithm for Nested Image Watermarking
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2014, Vol 1, Issue 7
Abstract
An image watermarking is process of embed an image with some parameter (secondary parameter) known as watermark image but without any degradation or deterioration in image quality to offer copyright protection. Copyright protection means protection from illegal copying for one’s intellectual property. Here the method of nested digital image watermarking is used. Nesting of image watermarking means when a watermark is embedded into the other watermark. The Randomized Least Significant Bit (RLSB) hiding algorithm is used for the process embedding because it has the lesser complexity and also it is more robust to variations with the type of image. And the blowfish cryptographic algorithm is used for encryption. Here encryption done into watermark image before embedding with the cover image. Here the concept of encrypt the watermark image before embedded with the main image just to increase the level of security of the watermarked image
Authors and Affiliations
Mayuri Verma
Study and Analysis of Knowledge Representation methods in Expert System
During the quarter century since the birth of the branch of computer science known as artificial intelligence (Al), much of the research has focused on developing symbolic models of human inference. In the last decade se...
Irredundant Complete Domination Number of Graphs
The concept of complete graphs with real life application was introduced in [17] .In [14] , A. Nellai Murugan et.al., was introduced the concept of complete dominating number of a graph. In this paper, We introduce a new...
A New unsaturated Ketone and other constituents from Dioscorea bulbifera
Discorea bulbifera1 (Fam. Dioscoreaceae) in a climber plant with tuberous root is found in tropical part of the world and grows thought out India. Tuber is used by the trivial population of central India as a food partic...
Exploration Encryption Mechanism Using Single Key for Public Cloud Storage
Sharing of Data is an main functionality in cloud Computing. In this system, we show how to share data in securely, flexibly, efficiently, and with others in cloud computing. Cloud storage is a bulk of information online...
China and Central Asian Regional Reconstruction: “One Belt One Route”
The Chinese Silk Road is the Trans-Eurasian network of trade routes connecting East and Southeast Asia to Central Asia, India, Southwest Asia, Mediterranean, and Northern Europe. The Road flourished roughly from 100 BC t...