Javascript must be enabled to continue!
Robust Digital Image Watermarking in YCbCr Color Space using Hybrid Method
View through CrossRef
The image watermarking is widely used to provide the security. This paper provides the conceptual framework on image watermarking which is widely used for security purpose within the epoch of data and communication technology. Detailed discuss has been provided on the basis of the three phases. In the first phase of present paper focus has been made on image watermarking and data set will be prepared on which watermarking technique will be executed. Second phase need to locate a specific watermarking technique [LWT- WALSH HADMARD-SVD] which will provide appropriate results in term of PSNR and processing time. In second phase various attacks will be tested on images so that implemented method must stand against various attacks. Last phase emphasise on reverse process will be executed to extract cover and watermark image. Proposed technique is based on the secure encryption watermark .It is associated with image encryption. The encryption algorithm had been introduced in which watermarking information was based on the size of an image. It is clear from the outcomes of the hybrid proposed technique shows that it provides more security than the existing technique. Proposed techniques provide high level of security as compared to existed technology.
Auricle Technologies, Pvt., Ltd.
Title: Robust Digital Image Watermarking in YCbCr Color Space using Hybrid Method
Description:
The image watermarking is widely used to provide the security.
This paper provides the conceptual framework on image watermarking which is widely used for security purpose within the epoch of data and communication technology.
Detailed discuss has been provided on the basis of the three phases.
In the first phase of present paper focus has been made on image watermarking and data set will be prepared on which watermarking technique will be executed.
Second phase need to locate a specific watermarking technique [LWT- WALSH HADMARD-SVD] which will provide appropriate results in term of PSNR and processing time.
In second phase various attacks will be tested on images so that implemented method must stand against various attacks.
Last phase emphasise on reverse process will be executed to extract cover and watermark image.
Proposed technique is based on the secure encryption watermark .
It is associated with image encryption.
The encryption algorithm had been introduced in which watermarking information was based on the size of an image.
It is clear from the outcomes of the hybrid proposed technique shows that it provides more security than the existing technique.
Proposed techniques provide high level of security as compared to existed technology.
.
Related Results
Crescimento de feijoeiro sob influência de carvão vegetal e esterco bovino
Crescimento de feijoeiro sob influência de carvão vegetal e esterco bovino
<p align="justify"><span style="color: #000000;"><span style="font-family: 'Times New Roman', serif;"><span><span lang="pt-BR">É indiscutível a import...
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
On Flores Island, do "ape-men" still exist? https://www.sapiens.org/biology/flores-island-ape-men/
<span style="font-size:11pt"><span style="background:#f9f9f4"><span style="line-height:normal"><span style="font-family:Calibri,sans-serif"><b><spa...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract
In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Boja kao izlagački aspekt narativnoga filma
Boja kao izlagački aspekt narativnoga filma
The dissertation, titled Colour as an Expository Aspect of the Narrative Film, explores how color shapes the narrative, aesthetic, and emotional dimensions of film. Analyzing the h...
A Robust Digital Speech Watermarking Based on Least Significant Bit
A Robust Digital Speech Watermarking Based on Least Significant Bit
Watermarking is a technique to ensure the original information and to validate the digital content. Watermarking is required because of the rise in the utilization of the internet ...
Digital Watermarking for Multimedia Transaction Tracking
Digital Watermarking for Multimedia Transaction Tracking
This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are su...
Seditious Spaces
Seditious Spaces
The title ‘Seditious Spaces’ is derived from one aspect of Britain’s colonial legacy in Malaysia (formerly Malaya): the Sedition Act 1948. While colonial rule may seem like it was ...

