Robust Image Watermarking using Three Domains of SVD
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
In this paper robust watermarking scheme is proposed using SVD. Initially singular value decomposition is applied to the host image. After SVD, watermark is embedded in three domains i.e., in D, U and V. Watermark is embedded in individual domain as well as combination of domains. Embedding in D domain is implemented by modifying bits. Embedding in U and V domains is implemented by changing coefficient values. Robustness of the proposed algorithm is verified by applying attacks like rotation, rows removal, cropping, salt & pepper noise, speckle noise and gaussian noise. Results indicate the proposed method is able to survive for different attacks.
Authors and Affiliations
V. Madhuri, K. Veera Swamy
Android Based Braille Interactive System
In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...
Hadoop Map Reduce Job Scheduler Implementation and Analysis in Heterogeneous Environment
Hadoop MapReduce is one of the popular framework for BigData analytics. MapReduce cluster is shared among multiple users with heterogeneous workloads. When jobs are concurrently submitted to the cluster, resources ar...
Improved Secure Authentication By Using Image compare and Captcha
The concept of CaRP (Captcha as Graphical Passwords) is easy but generic. CaRP can have manifold instantiations. In presumption, any Captcha plan relying on multiple-object categorization can be rehabilitated to a Ca...
A Study on Tactics Used to Incorporate Medical Informatics and Automated Diagnostic Methods
Drastic changes have taken place in medicine over the last century. Physicians were faced with the difficulty of making diagnoses with little information that are not sufficient, often resorting to exploratory surger...
Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls
Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends an...