This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast
encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key
stream generator. The image is partially encrypted by selecting most important components of image. To
obtain most important components of an image, discrete wavelet transform is applied.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction
of that secret message at its destination. Different carrier file formats can be used in steganography.
Among these carrier file formats, digital images are the most popular. For this work, digital images are
used. Here steganography is done on the skin portion of an image. First skin portion of an image is
detected. Random pixels are selected from that detected region using a pseudo-random number generator.
The bits of the secret message will be embedded on the LSB of these random pixels. An analysis is done to
check the efficiency and robustness of the proposed method. The aim of this work is to show that
steganography done using random pixel selection is less prone to outside attacks.
CV.ASAKA PRIMA | DUTA MEDIA GROUP sebagai Produsen adalah Distributor Utama yang membantu pengadaan para peserta tender produk-produk untuk pengadaan di BKKBN 2014 dengan kualitas dan mutu yang sesuai dengan standar Juknis DAK BKKBN 2014, Bagi rekanan pemenang tender yang ingin membutuhkan barang-barang kebutuhan DAK BKKBN 2014|DAK BKKBD 2014 kami CV.ASAKA PRIMA | DUTA MEDIA GROUP siap mensupplai & menyediakan :
KIE KIT,IMPLANT REMOVEL KIT,IUD KIT,SARANA PLKB,NOTEBOOK BKKBN,PC KOMPUTER BKKBN,PUBLIC ADDRESS BKKBN,ATTG,OBGYN BED/MEJA OBSTERIC,GYNECOLOGI,APE KIT,BKB KIT + APE KIT dan,Buku BKB Penyuluhan,seragam BKKBN,MATERI BKB KIT,Sarana PLKB
yang Sesuai Dengan Spesifikasi Sesuai Juknis , Barang dijamin sesuai dengan Spesifikasi.!
Untuk Pemesanan Hub :
CV.ASAKA PRIMA | DUTA MEDIA GROUP
PERCETAKAN & DISTRIBUTOR ALAT LAB & PERAGA PENDIDIKAN.
Workshop : Jl.Kebon Besar No.22 BatuCeper - Tangerang - Banten 15000.
Showroom & Marketing : Jl.Maulana Hasanudin No.52 Cipondoh - Tangerang 15000.
Telp.021-55701397 / 021-55702265
Hp:0813.8053.7399./ 0877.7445.0835/ 0813.18913674 ,
PIN BB. 2AC88941 / 276B6C52 / 2A8A5E31 /
http://www.asakaprima.com/
Email :asakaprima@gmail.com
yahoo ID:dutamedia89
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast
encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key
stream generator. The image is partially encrypted by selecting most important components of image. To
obtain most important components of an image, discrete wavelet transform is applied.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction
of that secret message at its destination. Different carrier file formats can be used in steganography.
Among these carrier file formats, digital images are the most popular. For this work, digital images are
used. Here steganography is done on the skin portion of an image. First skin portion of an image is
detected. Random pixels are selected from that detected region using a pseudo-random number generator.
The bits of the secret message will be embedded on the LSB of these random pixels. An analysis is done to
check the efficiency and robustness of the proposed method. The aim of this work is to show that
steganography done using random pixel selection is less prone to outside attacks.
CV.ASAKA PRIMA | DUTA MEDIA GROUP sebagai Produsen adalah Distributor Utama yang membantu pengadaan para peserta tender produk-produk untuk pengadaan di BKKBN 2014 dengan kualitas dan mutu yang sesuai dengan standar Juknis DAK BKKBN 2014, Bagi rekanan pemenang tender yang ingin membutuhkan barang-barang kebutuhan DAK BKKBN 2014|DAK BKKBD 2014 kami CV.ASAKA PRIMA | DUTA MEDIA GROUP siap mensupplai & menyediakan :
KIE KIT,IMPLANT REMOVEL KIT,IUD KIT,SARANA PLKB,NOTEBOOK BKKBN,PC KOMPUTER BKKBN,PUBLIC ADDRESS BKKBN,ATTG,OBGYN BED/MEJA OBSTERIC,GYNECOLOGI,APE KIT,BKB KIT + APE KIT dan,Buku BKB Penyuluhan,seragam BKKBN,MATERI BKB KIT,Sarana PLKB
yang Sesuai Dengan Spesifikasi Sesuai Juknis , Barang dijamin sesuai dengan Spesifikasi.!
Untuk Pemesanan Hub :
CV.ASAKA PRIMA | DUTA MEDIA GROUP
PERCETAKAN & DISTRIBUTOR ALAT LAB & PERAGA PENDIDIKAN.
Workshop : Jl.Kebon Besar No.22 BatuCeper - Tangerang - Banten 15000.
Showroom & Marketing : Jl.Maulana Hasanudin No.52 Cipondoh - Tangerang 15000.
Telp.021-55701397 / 021-55702265
Hp:0813.8053.7399./ 0877.7445.0835/ 0813.18913674 ,
PIN BB. 2AC88941 / 276B6C52 / 2A8A5E31 /
http://www.asakaprima.com/
Email :asakaprima@gmail.com
yahoo ID:dutamedia89
We are very excited to announce that PALO Creative is the title agency sponsor for DOYO Live and that Jim Komara, Digital Marketing Director at PALO will be a breakout session leader and will give you a deep dive into the world of SEO in a fun understandable way.
The Google algorithm has become very sophisticated and many traditional SEO techniques no longer work. Black Hatters and Link Farmers are largely out of work with Content Producers coming into their own. This session will review some of the recent changes that affect your search engine rank and dive into the details that make the difference.
After this session, attendees will be able to “see like a search engine spider.”
About Jim Komara
Jim began launching websites in the late 1990s when the primary way to find a site was using directories like Yahoo. Shortly after starting his first web design business, Google came on the scene and suddenly customers were all vying for the number one spot on search engine results.
Jim started writing computer games and math programs in high school. A veteran of the United States Army, he served in Operation Desert Storm during the Gulf War as an Intelligence Analyst, building computer databases. After returning home, he worked as a real estate agent and began writing programs for his business and creating websites.
In 2004, founded RealEstatePointe, a company that creates and maintains real estate company websites and web applications across the country. Since then he has focused on digital marketing, SEO and website building for companies across a broad spectrum of industries.
Jim is the Digital Marketing Director at PALO Creative where he gets to meet new clients who bring new challenges every week, which he calls “non-stop fun!”
This upbeat, energetic presentation highlights the basic to complex state of social media, digital marketing and content strategies in marketing today. Dennis Schiraldi talks about the early days of marketing a medical practice via digital marketing at a time that most of the world questioned the validity of marketing healthcare on Facebook, Twitter, YouTube and the web. Dennis is the founder of www.doyolive.com a digital marketing and UX design conference being held in Youngstown, Ohio on August 4, 2016.
A2 - Aspectos Psicológicos - The Psychology of SecuritySpark Security
Security is both a feeling and a reality. And they’re not the same.This essay is my initial attempt to explore the feeling of security: where it comes from, how it works, and why it diverges from the reality of security.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
PREVENTING COPYRIGHTS INFRINGEMENT OF IMAGES BY WATERMARKING IN TRANSFORM DOM...ijistjournal
Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are surely an indispensable part of human life .The trend of sharing images of various kinds for example typical technical figures, modern exceptional masterpiece from an artist, photos from the recent picnic to hill station etc, on the internet is spreading like a viral. There is a mandatory requirement for checking the privacy and security of our personal digital images before making them public via the internet. There is always a threat of our original images being illegally reproduced or distributed elsewhere. To prevent the misuse and protect the copyrights, an efficient solution has been given that can withstand many attacks. This paper aims at encoding of the host image prior to watermark embedding for enhancing the security. The fast and effective full counter propagation neural network helps in the successful watermark embedding without deteriorating the image perception. Earlier techniques embedded the watermark in the image itself but is has been observed that synapses of neural network provide a better platform for reducing the distortion and increasing the message capacity.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
Similar to A robust combination of dwt and chaotic function for image watermarking (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
A robust combination of dwt and chaotic function for image watermarking
1. International Journal of Current Trends in Engineering & Technology
ISSN: 2395-3152
Volume: 02, Issue: 02 (MAR-APR, 2016)
252
A Robust Combination of DWT and Chaotic Function for Image
Watermarking
Rajkumari Lalwani, S. R. Yadav, Avinash Sharma
Computer Science & engineering Department
Millennium Institute of Technology, Bhopal
1
rajkumarilalwai@gmail.com, 2
techmillenniumk.yadav@gmail.com, 3
avinashavi07@rediffmail.com
Abstract— with the increase in the digital media transfer
and modification of image is very easy. This independency
generate proprietorship problem of the user. So this paper
focuses on this problem of increasing the robustness of the
image against various attacks. Here new approach of
protecting watermark of the image is done by DCT
technique at selected blocks of chaotic function work
effectively for fulfilling the requirement. Experiment is
done on standard images and under compression attack.
Results shows that proposed work is better as compare to
previous existing research.
Keywords-- Color Format, Digital Watermarking,
Frequency domain, LSB.
I. INTRODUCTION
As digital world is growing drastically people are moving
towards different services provide by it. Some of this
service is social network, online market. But this technology
gives rise to new problem of piracy or in other words
proprietary get easily stolen. So to overcome these different
techniques are used for preserving the proprietary of the
owner. One of such digital approach is watermarking which
is a subsection of hiding information that is used to put
some information in the original image which will specify
the originality of the digital data like photographs, digital
music, or digital video [1, 2, 4]. One of the basic causes of
the copyright issue is the ease available of the internet and
some software that can modify the content as per the user
requirement. Watermark is broadly divide into two
categories first is visible watermarking and other is invisible
watermarking. Here watermark information seen by naked
eyes is considered as visible watermarking as shown in fig.
1. While in case of invisible watermark data is not visible by
naked eyes as shown in fig. 2, although watermark data is
present in the original data. Data may be of any digital
information like text file, image, video file, etc.
Requirement of invisible watermark is popular in
photography, movies, etc. So putting the signature in the
image for validating the data is done. Although invisible
embedding in carrier image is complex and challenging task
but different techniques are working in this field. Proposed
work will increase the hiding capacity and preserve carrier
as well as watermark information.
Figure 1 Visible watermark in image data
Figure 2 Visible watermarks in image data
II. RELATED WORK
J. Wu, and J.Xie [22] propose an adaptive watermarking
technique in DCT domain using HVS model and fuzzy c-
means technique (FCM). In this method FCM technique is
used to classify non-overlapping 88×original blocks into
categories: one is suitable for watermarking with high
imperceptibility and robustness and the other is unsuitable.
Watermark is inserted in DCT mid-frequency coefficients of
selected blocks. W. Zhang et el. [23] propose an adaptive
digital watermarking approach. In this method FCM
technique is used to determine the watermark strength of
each image pixel, and then watermark is inserted adaptively
to the N largest magnitude non-dc DCT coefficients of the
host image. The both the method performs better against
additive noise, compression and cropping etc. Yifei Pu. et
el. [24] proposes a public adaptive watermark algorithm m
for color images based on principal components analysis of
2. International Journal of Current Trends in Engineering & Technology
ISSN: 2395-3152
Volume: 02, Issue: 02 (MAR-APR, 2016)
253
generalized Hebb. The algorithm is based on principal
component analysis of generalized Hebb adaptive algorithm
in Artificial Neural Network and to do adaptive quantitative
coding for principal component coefficients according to the
proportion of marginal or textural information of the
watermark image. In addition, it adaptively adjusts the
embedding depth according to the images features to ensure
the invisibility of the watermark. By way of disporting and
stochastic embedding into color image watermark, it
increases the embedding robust city of watermark. C.
Podilchuk, W. Zeng [21] propose a watermarking technique
for digital images that is based on utilizing visual models,
which have been developed in the context of image
compression. The visual model gives a direct way to
determine the maximum amount of watermark signal that
each portion of an image can tolerate without affecting the
visual quality of the image. The watermark encoding
scheme consists of a frequency decomposition based on an
8×8 framework followed by just noticeable difference
(JND) calculation and watermark insertion. The watermark
scheme is robust to different attacks such as JPEG
compression, additive noise, scaling etc.
III. PROPOSED METHODOLOGY
Read Carrier Image: - Here as the image is the collection
of pixels where each pixel is representing a number
that are reflecting a number over there now for each number
depend on the format it has its range such that for the gray
scale format it is in the range of 0-255. So read an image
means making a matrix of the same dimension of the image
then fill the matrix correspond to the pixel value of the
image at the cell in the matrix.
DWT (Discrete Wavelet Transform):- Apply DWT on pre-
processed image. As the image are modify in the low
frequency region so the effect of compression attack is very
less. If direct change is done at this level then chance of
watermark recovery get decrease and quality of video also
degrade as at high frequency region human can detect it
easily. Here whole image is dividing into four part name as
LL, LH, HL, HH band where LL band is low frequency
band.
Chaotic Function:- In this step original image from the
database is jumble by utilizing the chaotic matrix where
each pixel position is multiply by the matrix, then new
position is obtain for the pixel value. In similar fashion all
pixels of the image is randomize. Chaotic Matrix =
CM (Chaotic Matrix), is variable range from 1, 2…n.
Let P is matrix represent [row, column], then multiple CM
and p, will give N matrix which is a new pixel position of
the older pixel. N=CM*P
Make Image Block: Here image is dividing into same size
of three blocks. Here size is same as 8X8 in this case 8
means number of pixel in the row and column should be
8X8=64 pixels. Now watermark is also dividing into same
set of blocks of 8X8 so that Euclidean distance between
those blocks can be calculated. Finally block which has
minimum distance from the carrier image is replaced.
Eludician Distance: - In this step distance between the
blocks of the image is calculated. This formula is same as
the Pythagoras theorem. Let X and Y is the image feature
for distance calculation. ))(( 2
YXsumD So as per the D
value of the watermark block embedded block in carrier
image is selected.
Embedding Block: - As work is done on image so
embedding is done on the matrix of the image, so whole
operation of embedding is done by finding the minimum
distance image from the watermark block. As most
matching block have minimum distance and replace that
block with watermark block. In similar fashion other blocks
of the carrier image is replace. In order to increase the
transparency block size can be reduced.
IDWT (Inverse Discrete Wavelet Transform):- Finally
IDWT is applying on the embedded image this will
retransform the matrix in original form. This is necessary as
matrix is dividing as per LL, HL, LH, HH quadrants. After
IDWT all the blocks are combining back to single image.
3.1 Proposed Encryption Algorithm
Input: O [Original Image], w [Watermark]
Output: EI [Embedded Image]
Loop 1: C // c: Cycle of chaotic function.
[LL LH HL HH]DWT (O)
While distance between new LL and original LL < T
// T is Threshold
LLChaotic_function (LL)
If c= Embedding_position
BLL[n] Blocks (LL) // n number of blocks
BW[m] Blocks (W) // n number of blocks
Loop 1: m
Loop 1: n
D[n] Euclidean (BLL[n], BW[m])
xMin (D) // MSB three bit
BLL[n] BW[m]
End Loop
End Loop
3. International Journal of Current Trends in Engineering & Technology
ISSN: 2395-3152
Volume: 02, Issue: 02 (MAR-APR, 2016)
254
LLCombine_Block (BW)
End While
EIIDWT (LL LH HL HH)
Figure 3 Block diagram of proposed Embedding Work
3.2 Extraction
In this step whole process of extraction is explained which
is almost same as done in embedding. Here input is
embedded image while output is extracted image. Here
DWT is applying on the embedded image then LL band is
select for rest of operations. Now LL band undergoes a
chaotic function where at fix number of rotation it get stop.
This position is same as done at embedding time. Now
matrix at this position is use for extraction of watermark
data. Divide matrix into same size of blocks as done in
embedding, and then find the replaced and non-replaced
blocks of the input matrices. So this extraction of data is
repeat in each block till all watermark information is not
extract from the matrix. Once watermark is extract then
remaining chaotic rotation is continue to get image in
original form.
IV. Experiment and Result
This section presents the experimental evaluation of the
proposed Embedding and Extraction technique for privacy
of image. All algorithms and utility measures were
implemented using the MATLAB tool. The tests were
performed on 2.27 GHz Intel Core i3 machine, equipped
with 4 GB of RAM, and running under Windows 7
Professional. Experiment done on the standard images such
as mandrilla, Lena, pirate, etc. Result is compare at two
condition first is without attack and other is at noise and
filter attack.
4.1 Evaluation Parameter
Peak Signal to Noise Ratio (PSNR):- it is use to find the
amount of data present from the received signal as it may
corrupt by the presence of some noise. So it is term as the
peak signal to noise ratio. PSNR is the ratio between the
maximum possible received information and the noise that
affects the fidelity of its representation.
PSNR =
errorSquareMean
valuepixelMax
__
__
log10 10
figure 4 Represent dataset images.
Structural Similarity index: - SSIM term is a method for
finding the similarity between two images. The SSIM
method use for evaluating the image quality based on an
initial uncompressed or distortion-free image as reference. It
is introduce to improve the traditional schemes like PSNR
and MSE, which have proven to be inconsistent with human
eye perception.
Extraction Rate: - This is the reverse of the BER where
value is obtained by the ratio of the correct bits received
after extraction to the total number of bits embeds at the
sandier. The extraction rate η is defined as follows:
Where nc is the number of correctly extracted bits, and na is
the total number of embedded bits.
From given table 2 and 3 it is obtain those three images are
chosen for testing, in presence of ideal condition. It is
observed that proposed work is better as compare to the
Embedding method in [9]. As in proposed work watermark
information is add in the image separately. From given table
4, 5, 6 and 7 it is obtain that three images are chosen for
testing, in presence of different attack. It is observed that
proposed work is approximately same as compare to the
Embedding method in [9]. As in proposed work watermark
information is add in the DWT LL band of image
separately. From above tables it is obtain that ETA values of
the information received has high percentage of recovery in
presence of noise attack. While ETA values of the
information received has low percentage of recovery in
presence of filter attack.