Submit Search
Upload
Fuzzy Logic based watermarking using non – blind HVS technique
•
0 likes
•
21 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I348.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
journalBEEI
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
IRJET Journal
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
IOSR Journals
E017263040
E017263040
IOSR Journals
K42016368
K42016368
IJERA Editor
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
csandit
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET Journal
Recommended
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
journalBEEI
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
Watermarking Scheme based on Redundant Discrete Wavelet Transform and SVD
IRJET Journal
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
IOSR Journals
E017263040
E017263040
IOSR Journals
K42016368
K42016368
IJERA Editor
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
A BLIND ROBUST WATERMARKING SCHEME BASED ON SVD AND CIRCULANT MATRICES
csandit
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET- Digital Watermarking using Integration of DWT & SVD Techniques
IRJET Journal
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
ijtsrd
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
CSCJournals
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
ijcsit
Gh2411361141
Gh2411361141
IJERA Editor
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
David Bařina
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
IJERA Editor
Ceis 5
Ceis 5
Alexander Decker
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET Journal
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
IJECEIAES
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial Adaptation
CSCJournals
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
IOSR Journals
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
IJECEIAES
Fuzzy entropy based optimal
Fuzzy entropy based optimal
ijsc
Ppt
Ppt
GMRIT
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
CSCJournals
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
IRJET Journal
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020
RohanLekhwani
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
A130104
A130104
irjes
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
IRJET Journal
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
IRJET Journal
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
IRJET Journal
More Related Content
What's hot
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
ijtsrd
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
CSCJournals
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
ijcsit
Gh2411361141
Gh2411361141
IJERA Editor
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
David Bařina
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
IJERA Editor
Ceis 5
Ceis 5
Alexander Decker
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET Journal
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
IJECEIAES
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial Adaptation
CSCJournals
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
IOSR Journals
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
IJECEIAES
Fuzzy entropy based optimal
Fuzzy entropy based optimal
ijsc
Ppt
Ppt
GMRIT
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
CSCJournals
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
IRJET Journal
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020
RohanLekhwani
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
A130104
A130104
irjes
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
IRJET Journal
What's hot
(20)
New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Performance comparison of hybrid wavelet transforms formed using dct, walsh, ...
Gh2411361141
Gh2411361141
Lifting Scheme Cores for Wavelet Transform
Lifting Scheme Cores for Wavelet Transform
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Ceis 5
Ceis 5
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Performance Evaluation of Quarter Shift Dual Tree Complex Wavelet Transform B...
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial Adaptation
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency Band
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
Fuzzy entropy based optimal
Fuzzy entropy based optimal
Ppt
Ppt
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
Content Based Video Retrieval in Transformed Domain using Fractional Coeffici...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
A130104
A130104
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
Similar to Fuzzy Logic based watermarking using non – blind HVS technique
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
IRJET Journal
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
IRJET Journal
Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning Techniques
IRJET Journal
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
IRJET Journal
An Energy Efficient and High Speed Image Compression System Using Stationary ...
An Energy Efficient and High Speed Image Compression System Using Stationary ...
rahulmonikasharma
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
IRJET Journal
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
eSAT Publishing House
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
eSAT Journals
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET Journal
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET Journal
Optimal Deployment Scheme for Load Balancing in Sensor Network
Optimal Deployment Scheme for Load Balancing in Sensor Network
IRJET Journal
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
eSAT Publishing House
Image Fusion Ehancement using DT-CWT Technique
Image Fusion Ehancement using DT-CWT Technique
IRJET Journal
IRJET - Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
IRJET Journal
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
IRJET Journal
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
IRJET Journal
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
IJERA Editor
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET Journal
Implementation of Noise Removal methods of images using discrete wavelet tran...
Implementation of Noise Removal methods of images using discrete wavelet tran...
IRJET Journal
IRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite Integration
IRJET Journal
Similar to Fuzzy Logic based watermarking using non – blind HVS technique
(20)
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Garbage Classification Using Deep Learning Techniques
Garbage Classification Using Deep Learning Techniques
Minimum image disortion of reversible data hiding
Minimum image disortion of reversible data hiding
An Energy Efficient and High Speed Image Compression System Using Stationary ...
An Energy Efficient and High Speed Image Compression System Using Stationary ...
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
Medical image analysis and processing using a dual transform
Comparative Analysis of DCT and DWT based novel methods for Watermarking
Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
Optimal Deployment Scheme for Load Balancing in Sensor Network
Optimal Deployment Scheme for Load Balancing in Sensor Network
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
Image Fusion Ehancement using DT-CWT Technique
Image Fusion Ehancement using DT-CWT Technique
IRJET - Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Robust Image Watermarking using Svd and Differential Evolution in DWT Domain
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Pointing Gesture-based Signal to Text Communication System Using OpenCV in ...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
IRJET-An Effective Strategy for Defense & Medical Pictures Security by Singul...
Implementation of Noise Removal methods of images using discrete wavelet tran...
Implementation of Noise Removal methods of images using discrete wavelet tran...
IRJET- Parallelization of Definite Integration
IRJET- Parallelization of Definite Integration
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Recently uploaded
(20)
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Fuzzy Logic based watermarking using non – blind HVS technique
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 233 Fuzzy Logic based watermarking using non – blind HVS technique M Suneetha1, K Meenakshi2, 1Assistant Professor, Department of ECE, GRIET, Hyderabad, India 2Assistant Professor, Department of ECE, GRIET, Hyderabad, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This article proposes a non-blindwater-marking based on Human Visual System (HVS) and Fuzzy Inference System (FIS) with Discrete Cosine transform(DCT). Theimage transformed is segmented into 8 × 8 non over-lapping blocks and for each block parameters such as contrast sensitivity, luminous sensitivity, edge sensitivity, number of on pixels and number of regions are designed and are fed to FIS. The output of fuzzy system is a single value whichgivesacontinuousvalue of analogous to each DCT coincident. A binary watermark is set in the original image based on perpetual weight premeditated through FIS. Therobustnessofproposedmethod is examined by subjecting watermarked image to several attacks. It is institute that fuzzy based watermarkingachieves high imperceptibility and robustness to attacks. Key Words: HVS, FIS, DCT 1.INTRODUCTION With the increase in the availability of digital data over internet, the images so distributed can be copied repeatedly with or without error, putting the rights of owner at risk. One way to arrest illegalduplicationisto in-sert owner’s identity known as watermark into potentially vulnerable images so that watermarks are inseparable from the images itself. The important requirements of watermarking [1] are centered on three main issues -These are imperceptible quality of watermarked and attacked images, robustness and embedding capacity. Among these the former two parameters are important and these are found to be mutually conflicting. Because of this water-marking may be perceived as anoptimizationproblemtoobtain robust embedding and extraction scheme. This paper addresses the problem by constructing fuzzy perpet- ual masks. Human Visual System is the ultimate receiver of most processed images. Incorporating. Just Noticeable Difference(JND)providesameanstomodel perpetual redundancy that is the maximum distortion which cannot be perceived by human eye. In [6]-[8] JND thresholds are computed based on background luminance adaption and spatial contrast masking. In [2] a more accurate JND map is deduced considering the overlapping effect between luminousadaptionand spatial contrast masking. But the drawback of the scheme is it does not consider contrast sensitivity function.A brief introduction of fuzzy logic is provided in section II. Proposed watermark embeding and extraction algorithms are presented in section III. Simulation results are presented in section IV. Conclusions are provided is in section V 2. FUZZY LOGIC Fuzzy logic provides a means for incorporating human knowledge in the solution of problems whose formulation is based on vague concepts [1]. FIS is used to map a given input to output based on fuzzy logic. Unlike crisp sets, fuzzy sets are having infinite valued membership functions. The mapping then provides a framework for interpreting the data from which decisions can be made. Principles of Fuzzy set theory: Let Z is a set of elements with element of Z denoted by z. This set is called Universe of Discourse. A fuzzy set A in Z is denoted by µA(Z) that associates each element with an interval between [0, 1].Therefore a fuzzy set is an ordered pair consists of values of z and a membership function that assigns a grade of membership to each z. The FIS has the following blocks as given in Ref. [2]. • Fuzzification: for eachscalarinput,findthecorre- sponding fuzzy values bymapping the input to the interval [0, 1], using applicable rules defined in rule editor. • Apply an implication method: It is way to use inputs and the knowledge base represented by if- then rules to creates the output of system. This process is known as implication or inference.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 234 • Defuzzification;Finalstepisconvertingfuzzyout- put to crisp output by computing the center of gravity of aggregated fuzzy set. Pn v0 = i=1 iQ(i) (1) Pn i=1 i 3. PROPOSED ALGORITHM The proposed watermarking is a non-blind watermark-ing based on Fuzzy logic. The input parametersfedtoFISarecontrastsensitivity,luminous sensitivity,edgesensitivity,numberofobjects,Number of active pixels. 3.1. WATERMARK EMBEDDING ALGORITHM The watermark concealing algorithm is given in the following steps in fig.1: 1) Take original image of size 256 ×256istakenand segment it into 8 × 8 blocks and compute number of on pixels and number of regionsandapplyDCT and compute luminous sensitivity, edge sensitivity and contrast sensitivity. a) Luminous sensitivity : If the background is brighter, more information can be hidden in original image [3] without noticing distortion. Luminous sensitivity is measure of brightness of back ground. In eachblockthefirstelement(0,0) represent DC component of block and XDCM is the mean of all D.C. coefficients of 8 × 8. It is defined in Eqn.2. Luminous sensitivity = XDC,i (2) XDCM b) Contrast sensitivity: Watermark embedded in textured region is harder to notice compared to smooth regions. The contrast sensitivity is measured by computing variance in each block using the matlab command “statxure ”. Where image_seg is 8 × 8 block of image and C is the second element of 7 row vectorgeneratedbythis command.This parameter is obtained by Eqn 3 C = statxture(image_seg) (3) c) Edge sensitivity: Watermark embedded in edge regions are harder to perceive compared to smoother region. The edges are detected by matlab command j = graythresh(image_seg) (4) d) Number of on pixels: In Ref. [5] a pixel is said to be active if it has intensity less than mean value by a factor of where K(σ) where σ is taken 1.2. e) Number of Regions: In Ref [5] it is calculated by converting image into binary image and count-ing the number of regions of connected pixels. Rules used in Fuzzy inference system i) If (luminous sensitivity is dark) and (contrast sensitivity is low) and (edge sensitivity is small) then (weight is least) (1) ii) If (luminous sensitivity is dark) and (contrast sensitivity is medium) and (edge sensitivity is low) then (weight is least) (1) iii) If (luminous sensitivity is dark) and (contrast sensitivity is high) and (edge sensitivity is low) then (weight is least) (1) iv) If (luminous sensitivity is medium) and (con- trast sensitivity is low) and (edge sensitivity is low) then (weight is least) (1)
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 235 v) If (luminous sensitivity is medium) and (con- trast sensitivity is medium) and (edge sensitiv- ity is low) then (weight is least) (1) vi) If (luminous sensitivity is medium) and (con- trast sensitivity is high) and (edge sensitivity is low) then (weight is least) (1) vii) If (luminous sensitivity is bright) and (contrast sensitivity is low) and (edge sensitivity is low) then (weight is least) (1) viii) If (luminous sensitivity is bright) and (contrast sensitivity is medium) and (edge sensitivity is low) then (weight is least) (1) ix) If (luminous sensitivity is bright) and (contrast sensitivity is high) and (edge sensitivity is low then (weight is least) (1) x) If (luminous sensitivity is dark) and (con-trast sensitivity is low) and (edge sensitivity is medium) and (Number of active pixels is low) and (number of objects is high) then (weight is less.) xi) If (luminous sensitivity is dark) and (contrast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xii) If (luminous sensitivity is dark) and (contrast sensitivity is medium) and (edge sensitivity is medium) and (Number ofonpixelsislowislow) and (number of regions is high) then (weight is Higher) (1) xiii) If (luminous sensitivity is medium) and (con- trast sensitivity is low) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is less) (1) xiv) If (luminous sensitivity is medium) and (con- trast sensitivity is medium) and (edge sensi- tivity is medium) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) (1) xv) If (luminous sensitivity is medium) and (con trast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is high) (weight is and ((number of regions is low) then average) (1) xvi) . If (luminous sensitivity is bright)and(contrast sensitivity is low) and (edge sensitivity is medium) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) (1) xvii) If (luminous sensitivity is bright) and (contrast sensitivity is medium) and (edge sensitivity is medium) and (Number of on pixels is high) and ((number regions is low) then (weight is average) (1) xviii) If (luminous sensitivityisbright)and(contrast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xix) If (luminous sensitivity is bright) and (con trast sensitivity is high) and (edge sensitivity is medium) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xx) . If (luminous sensitivity is dark) and (contrast sensitivity is low) and (edge sensitivity is large) and (Number of on pixels is high) and ((number of regions is low) then (weight is less) xxi) If (luminous sensitivity is dark) and (contrast sensitivity is medium) and (edge sensitivity is large) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xxii)If (luminous sensitivity is dark) and (contrast sensitivity is high) and (edge sensitivityislarge) and (Number of on pixels is low) and ((number of regions is high) then (weight is high) (1) xxiii) If (luminous sensitivity is medium) and (con trast sensitivity is low) and (edge sensitivity is large) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) If (luminous sensitivity is medium) and (con trast sensitivity is medium) and (edge sensitiv ity is large) and (Number of on pixels is high) and ((number of regions is low) then (weight is average) (1) xxv) If (luminous sensitivity is medium) and (con- trast sensitivity is high) and (edge sensitivity is large) and (Number of on pixels is low) and ((number of regions is high) then (weight is Higher) (1) xxvi) If (luminous sensitivity is bright) and (contrast sensitivity is low) and (edge sensitivity is large) and (Number of active pixels is high) and (num- ber of objects is low) then (weight is Higher) (1) xxvii) If (luminous sensitivity is bright) and (contrast sensitivity is low) and (edge sensitivity is large) and (Number of on pixels is high) and (number of regions is low) then (weight is Higher) (1) xxviii) If (luminous sensitivity is bright)and(contrast sensitivity is high) and (edge sensitivityislarge) and (Number of on pixels is low) and number of regions is high then weight is Highest) (1)
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 236 f) Obtain weight α from fuzzy inference system for each 8 × 8 block using fuzzy inference logic. g) Take watermark of size 32 × 32 and using rear- range bits to serially convert watermark into 1 dimensional vector. h) Select, a robust location ACp at the same po-sition from each 8 × 8 block. i) Rearrange ACq in the same position where watermark embedded. j) Apply inverse DCT and obtain watermarked image. ACp + T W hen W = 0 ACq = ACp − T W hen W = 1 (5) Fig. 3. Rule viewer of proposed scheme 3.2. Watermark Extraction 1) The input to watermark extraction is watermarked image and original watermark. 2) Apply DCT and segment it into 8 × 8blocks to the watermarked image and original image. 3) Apply FIS to both original and watermarked image. 4) Identify the embedding location ACp and ACq and before embedding the coefficient is and after embed-ding it becomes 5) if ACq >ACp then watermark bit is 1 else watermark bit 0. 6) Concatenate all watermark bits. 7) Convert 2d Arrays into 1d array. 8) Extract watermark
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 237 Fig. 4. Watermark Extraction Algorithm 4. Simulation results The host images of size 512 × 512. gray scale cover images Lena, Mandril and Pirate are used. The watermark is 64 × 64 is a logo of Gokaraju Rangaraju institute of Engineering and Technology. The peak signal to noise ratio gives the measure of imperceptibility. Higher the P.S.N.R, the better imperceptibility. 4.1. Imperceptibility Normally, in image processing, the quality of watermark is judged based on P.S.N.R. The P.S.N.R between water- marked and the original frame . P SN R = 10log10 2552 (6) M.S.E As scaling factor is improved the imperceptibility is in- creased but the robustness against attacks reduced. A subjective evaluation test is conducted by 30 subjects and it unanimously confirmed that the perpetual invisibility of the watermark. The experimental set up was conducted on four images which consist of two copies of each image and the images are displayed on computer screen and the subjects were asked to carefully look at displayed image Fig. 5. Original images of lena, living room, Baboon, Pirate. And watermarked images of Lena, living room, Baboon and pirate.
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 238 and then report if there is any difference between the two images. 4.2. Robustness To assess the robustness of proposed watermarking algo-rithms several attacks are applied. These attacks include JPEG compression, rotation, cropping on both sides and salt &pepper and Gaussian noise. The bit error rate and normalized cross correlation is computed between original watermark and extracted watermark. 5. CONCLUSIONS The images having more number of objects and less number of active pixels the imperceptibility is less. Con-trary to this for smoother images, the proposed method yield high imperceptibility. Fuzzy output is taken as nor-malized crisp output lying between 0 and 1. The pro-posed algorithm is found to be robust against number of attacks like JPEG compression (80%), Rotation, sym-metrical croppinguptoThehigh peak signal to noise ratio and robustness against number of attacks signifies the proposed method is highly imperceptible and robust. REFERENCES [1] Charu Agarwal and Anurag Mishra and Arpita Sharma, Gray-scale image watermarking using GA-BPN hybrid network , 24rd ed, volume:7 Journal of Visual Communication and Image Representation, 2013. [2]Beghdadi, Azeddine and Larabi, M-C and Bouzerdoum, Abdes-selam and Iftekharuddin, Khan M, A survey of perceptual image processing methods , 28rded,volume:8, pp no:811–831Signal Processing:ImageCommunication, 2013.
Download now