Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses wavelet transforms and fast wavelet transforms for image compression. It provides background on discrete wavelet transforms (DWT) and fast wavelet transforms. DWT is useful for image compression because it concentrates image energy into low-frequency coefficients. Compression is achieved by quantizing coefficients, prioritizing low-frequency ones. Popular image compression techniques like JPEG2000 use DWT. Fast wavelet transforms like Mallat's algorithm allow faster image analysis than DWT. The document reviews various image compression techniques and their performance in terms of compression ratio and image quality.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes and analyzes different digital watermarking techniques under various attacks. It compares the Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) watermarking algorithms in terms of invisibility, distortion, and robustness. The LSB, DCT, and DWT watermark embedding and extraction procedures are described. Simulation results showed that the algorithms had good robustness against common image processing operations and were invisible with low distortion.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses wavelet transforms and fast wavelet transforms for image compression. It provides background on discrete wavelet transforms (DWT) and fast wavelet transforms. DWT is useful for image compression because it concentrates image energy into low-frequency coefficients. Compression is achieved by quantizing coefficients, prioritizing low-frequency ones. Popular image compression techniques like JPEG2000 use DWT. Fast wavelet transforms like Mallat's algorithm allow faster image analysis than DWT. The document reviews various image compression techniques and their performance in terms of compression ratio and image quality.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
here it introduces an efficient multi-resolution watermarking methodology for copyright protection of digital images. By adapting the watermark signal to the wavelet coefficients, the proposed method is highly image adaptive and the watermark signal can be strengthen in the most significant parts of the image. As this property also increases the watermark visibility, usage of the human visual system is incorporated to prevent perceptual visibility of embedded watermark signal. Experimental results show that the proposed system preserves the image quality and is vulnerable against most common image processing distortions. Furthermore, the hierarchical nature of wavelet transform allows for detection of watermark at various resolutions, resulting in reduction of the computational load needed for watermark detection based on the noise level. The performance of the proposed system is shown to be superior to that of other available schemes reported in the literature.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
SECURED COLOR IMAGE WATERMARKING TECHNIQUE IN DWT-DCT DOMAIN ijcseit
The multilayer secured DWT-DCT and YIQ color space based image watermarking technique with
robustness and better correlation is presented here. The security levels are increased by using multiple pn
sequences, Arnold scrambling, DWT domain, DCT domain and color space conversions. Peak signal to
noise ratio and Normalized correlations are used as measurement metrics. The 512x512 sized color images
with different histograms are used for testing and watermark of size 64x64 is embedded in HL region of
DWT and 4x4 DCT is used. ‘Haar’ wavelet is used for decomposition and direct flexing factor is used. We
got PSNR value is 63.9988 for flexing factor k=1 for Lena image and the maximum NC 0.9781 for flexing
factor k=4 in Q color space. The comparative performance in Y, I and Q color space is presented. The
technique is robust for different attacks like scaling, compression, rotation etc.
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
The document describes a proposed high speed and area efficient 2D discrete wavelet transform (DWT) processor design for image compression applications implemented on FPGAs. The design uses a pipelined partially serial architecture to enhance speed while optimally utilizing FPGA resources. Simulation results show the design operating at 231MHz on a Spartan 3 FPGA, a 15% improvement over alternative designs. Resource utilization and speed are improved compared to previous implementations through the optimized DWT processor architecture and FPGA platform choice.
This document compares the DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) image compression techniques. It finds that DWT provides higher compression ratios and avoids blocking artifacts compared to DCT. DWT allows for better localization in both spatial and frequency domains. It also has inherent scaling and better identifies visually relevant data, leading to higher compression ratios. However, DCT is faster than DWT. Experimental results on test images show that DWT achieves higher PSNR and lower MSE and BER than DCT, while providing a slightly higher compression ratio and completing compression more quickly.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
This document proposes a new approach to compressed image steganography using wavelet transform. The method embeds a compressed payload image within a cover image using discrete wavelet transform (DWT) for image compression and discrete Fourier transform (DFT) to select pixel locations in the cover image. Five test cases of the approach are described and evaluated. In the first case, DWT is applied to the payload image to get 32x32 approximate coefficients, DFT is applied to the cover image to select pixel locations below a threshold, and the coefficients replace the selected pixel values to create the stego-image. The other cases vary the DWT level, threshold value, and image sizes. Results show the stego-image quality
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Architectural implementation of video compressioniaemedu
The document discusses video compression using wavelet transform coding and EZW coding. It begins with an introduction to wavelet transforms and their use in image and video compression. It then describes performing a Haar wavelet transform on video frames, downsampling the frames, and encoding the output with EZW coding. The encoded data is transmitted through a channel encoder. At the receiver, the reverse process of decoding and upsampling is performed to reconstruct the video. Video quality is assessed using peak signal-to-noise ratio between frames. The method aims to remove blocking artifacts and improve video quality compared to standard DCT-based compression.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital watermarking with a new algorithmeSAT Journals
Abstract Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB; another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a 512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc. After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better performance. Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt and pepper attack, PSNR, correlation, MSE.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
The document describes a method for de-noising electrocardiogram (ECG) signals using empirical mode decomposition (EMD) combined with higher order statistics (HOS). EMD is used to decompose ECG signals into intrinsic mode functions (IMFs). Then, HOS measures including kurtosis and bispectrum are applied to the IMFs to identify and remove Gaussian noise components. The algorithm is tested on ECG signals with different levels of signal-to-noise ratio, and signal improvement is measured using SNR improvement and percent root mean square difference. Results show the method effectively de-noises ECG signals.
An Experimental Study on Strength Properties of Concrete When Cement Is Parti...IOSR Journals
This study investigated the strength properties of concrete when cement is partially replaced with two types of sugarcane bagasse ash (SBA): raw SBA (B.A.1) and SBA heated to 8500C (B.A.2). Cubes, cylinders and beams were tested after 28 days of curing. For B.A.1, maximum strengths were achieved at 5% replacement, while for B.A.2 maximum compressive strength was at 15% replacement, tensile at 20%, and flexural at 30% replacement. Results showed that concrete with B.A.2 generally had higher strengths than with B.A.1, indicating that heating SBA improves its pozzolanic
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...IOSR Journals
Novel bisazo-disperse dyes were prepared by the coupling of diazotized solutions of various aromatic diamines with 2,4-dihydroxybenzophenone. The resultant bisazo disperse dyes were characterized by elemental analysis, IR and 1H NMR spectral studies. The UV Visible absorption spectral data were investigated in dimethylformamide. and are discussed in terms of structural property relationship. Their dyeing assessment of bisazo disperse dyes has been made on polyester fabrics. The results show that a better hue was obtained on polyester fabrics and have mild to moderate fastness properties.
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...IOSR Journals
For the first time in solar physics, this paper reports a comprehensive study how 235Uranium fission
causes Sunlight by the atomic phenomenon, Padmanabha Rao Effect against the theory of fusion. The first major
breakthrough lies in identifying as many as 153 solar lines in the Bharat Radiation range from 12.87 to 31 nm
reported by various researchers since 1960s. The Sunlight phenomenon is explained as follows. For example, the
energy equivalence 72.48 eV of the most intense 17.107 nm emission in the middle of solar spectrum is the energy
lost by β, γ, or X-ray energy of a fission product while passing through core-Coulomb space. This energy loss is the
Bharat Radiation energy that cause EUV, UV, visible, and near infrared emissions on valence excitation. From vast
data of emissions and energies of various fission products, 606.31 keV β (Eβmax) energy of 131I was chosen as the
source of 17.107 nm emission. For the first time a typical Bharat Radiation spectrum was observed when plotted
energy loss against β, γ, or X-ray energies of fission products supposedly present in solar flare and atmosphere :
113Xe, 131I, 137Cs, 95Zr, 144Cs, 134I, 140Ba, 133I, 140La, 133In etc that caused solar lines. Consistent presence of a sharp
line for four months in AIA spectral EUV band at 335A exemplifies self-sustained uranium fission from a small site
appeared in SDO/AIA image at 304A. Sun’s dark spot is explained as a large crater formed on Sun’s core surface as
a result of fission reaction that does not show any emission since fission products would be thrown away from the
site during fission. Purely the same Sun’s core material left over at the site after fission reaction devoid of fission
products and any emission seems to be the familiar dark Matter. This could be the first report on the existence of
Sun’s Dark Matter.
Prime factors of Vendor Selection for Indian Telecom Service Provider for eff...IOSR Journals
Abstract: To have a effective supply chain it is very much essential to have effective and reliable vendor. It is
far more important in case of a service sector. As service is intangible and can only be felt ;hence very much
depends on the quality of delivery and after sales activity. Ineffective and unreliable vendor can have a
cascading effect in all aspect of service chain resulting customer dissatisfaction. The present study tries to find
out the parameter or quality of a vendor that is preferred by telecommunication companies. As
telecommunication is a infrastructure service any weak link in the supply chain will have a catastrophic impact
on the end user. As vendor is one of the prime component of supply chain its careful selection is of immense
importance. There are numerous variables to select a vendor. But to have a quick and effective decisions
making these numerous variables are reduced to few factors. In this study the centroid method of factor analysis
is used to find four important factors. The study was carried out by interacting executives of around 8 telecom
companies amounting to 57 effective data. A broad outline of factors and encompassing variables under each
factor were depicted.
Keywords - Factor analysis, Supply Chain and Vendor selection,
International journal of signal and image processing issues vol 2015 - no 1...sophiabelthome
This document discusses a method for embedding a binary watermark image into a digital video using a hybrid of three transforms: discrete cosine transform (DCT), discrete wavelet transform (DWT), and singular value decomposition (SVD). The method first applies DCT to frames of the video, then applies three-level DWT to the transformed frames. SVD is then applied to both the transformed video frames and the watermark image. The watermark is embedded by modifying coefficients of the video based on the SVD results. PSNR, MSE, and correlation are used to evaluate the quality and robustness of the watermarked video.
High Speed and Area Efficient 2D DWT Processor Based Image Compressionsipij
The document describes a proposed high speed and area efficient 2D discrete wavelet transform (DWT) processor design for image compression applications implemented on FPGAs. The design uses a pipelined partially serial architecture to enhance speed while optimally utilizing FPGA resources. Simulation results show the design operating at 231MHz on a Spartan 3 FPGA, a 15% improvement over alternative designs. Resource utilization and speed are improved compared to previous implementations through the optimized DWT processor architecture and FPGA platform choice.
This document compares the DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) image compression techniques. It finds that DWT provides higher compression ratios and avoids blocking artifacts compared to DCT. DWT allows for better localization in both spatial and frequency domains. It also has inherent scaling and better identifies visually relevant data, leading to higher compression ratios. However, DCT is faster than DWT. Experimental results on test images show that DWT achieves higher PSNR and lower MSE and BER than DCT, while providing a slightly higher compression ratio and completing compression more quickly.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
Comparison of SVD & Pseudo Random Sequence based methods of Image Watermarkingijsrd.com
Due to the extensive use of digital media applications, multimedia security and copyright protection has gained tremendous importance. Digital watermarking is a technology used for the copyright protection of digital applications. Image watermarking is used to hide the special information into the image and to later detect and extract that special information. Watermarking can be implemented both in spatial and frequency domain. In this paper frequency domain techniques were experimented. The methods compared in this paper are image watermarking using singular value decomposition (SVD) based and image watermarking using discrete wavelet transform (DWT) and Pseudo random sequence. Our experiments show that former technique have low peak signal to noise ratio (PSNR) value and also requires cover data at the detection where as in the later case we don’t require cover data and PSNR value is good.
This document proposes a new approach to compressed image steganography using wavelet transform. The method embeds a compressed payload image within a cover image using discrete wavelet transform (DWT) for image compression and discrete Fourier transform (DFT) to select pixel locations in the cover image. Five test cases of the approach are described and evaluated. In the first case, DWT is applied to the payload image to get 32x32 approximate coefficients, DFT is applied to the cover image to select pixel locations below a threshold, and the coefficients replace the selected pixel values to create the stego-image. The other cases vary the DWT level, threshold value, and image sizes. Results show the stego-image quality
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the low-high band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Architectural implementation of video compressioniaemedu
The document discusses video compression using wavelet transform coding and EZW coding. It begins with an introduction to wavelet transforms and their use in image and video compression. It then describes performing a Haar wavelet transform on video frames, downsampling the frames, and encoding the output with EZW coding. The encoded data is transmitted through a channel encoder. At the receiver, the reverse process of decoding and upsampling is performed to reconstruct the video. Video quality is assessed using peak signal-to-noise ratio between frames. The method aims to remove blocking artifacts and improve video quality compared to standard DCT-based compression.
DWT-DCT-SVD Based Semi Blind Image Watermarking Using Middle Frequency BandIOSR Journals
This document summarizes a research paper that proposes a semi-blind image watermarking technique using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The technique embeds a watermark in the middle frequency band of the DWT domain of a host image. It modifies the singular values of the DCT coefficients of the middle frequency band using singular values of the DCT transformed watermark. The watermark can then be extracted from the watermarked image using inverse processes. The technique was tested on various attacks and showed robustness, with correlation values between the extracted and original watermarks ranging from 0.5308 to 0.9665 and PSNR values indicating impercept
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital watermarking with a new algorithmeSAT Journals
Abstract Everyday millions of data need to transmit through a distinct channel for various purposes; as a result there is a certain chance of third person interruption on that data. In this regards digital watermarking is one of the best solution. This paper proposes a new embedding algorithm (NEA) of digital watermarking. The algorithm is performed for digital image as data. The performance is compared for NEA and well established Cox's modified embedding algorithm. The watermarking is based on discrete wavelet transforms (DWT) and discrete cosine transforms (DCT). The acceptance of the new algorithm is measured by the two requirements of digital watermarking. One is imperceptibility of the watermarked image, measured by peak signal to noise ratio (PSNR) in dB; another one is robustness of the mark image, measured by correlation of original mark image and recovering mark image. Here a 512×512 gray scale "Lena" and "Cameraman's" image is taken as host images, and a 128×128 gray scale image is taken as mark image for 2 level of DWT. The simulation results for different attacking conditions such as salt and pepper attack, additive white Gaussian noise (AWGN) attack, jpg compression attack, gamma attack, histogram attack, cropping attack, sharpening attack etc. After different attacks the changing tendency PSNR for both algorithms are similar. But the mean square error (MSE) value of NEA is always less than Cox’s modified algorithm, which means that after embedding the changes of the host image property lower for NEA than Cox’s algorithm. From the simulation results it can be said that NEA will be a substitute of modified Cox’s algorithm with better performance. Keywords: Digital watermark, DWT, DCT, Cox’s modified algorithm, Lena image, Cameraman image, AWGN, JPG, salt and pepper attack, PSNR, correlation, MSE.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document summarizes a research paper that proposes a novel video watermarking scheme using discrete wavelet transform (DWT) and principal component analysis (PCA). The scheme embeds a binary logo watermark into video frames for copyright protection. PCA is applied to blocks of two bands (LL-HH) resulting from DWT of video frames. The watermark is embedded into the principal components of LL and HH blocks at different levels. Combining DWT and PCA improves the watermarking performance by distributing the watermark bits over sub-bands, increasing robustness to attacks. The scheme provides imperceptible watermarking that is robust against various attacks such as geometric transformations and brightness/contrast adjustments.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that proposes a new digital image watermarking technique using discrete wavelet transform and singular value decomposition (DWT-SVD). The technique embeds a watermark in the high frequency subbands of an image after applying DWT and SVD. Experimental results show the watermarked images have high quality as measured by PSNR. The extracted watermarks are robust to common image distortions like noise, filtering, and cropping as measured by normalized cross correlation. A comparison shows the proposed technique provides better image quality and watermark extraction than a previous DWT-based method. The technique could provide copyright protection for digital images.
The document describes a method for de-noising electrocardiogram (ECG) signals using empirical mode decomposition (EMD) combined with higher order statistics (HOS). EMD is used to decompose ECG signals into intrinsic mode functions (IMFs). Then, HOS measures including kurtosis and bispectrum are applied to the IMFs to identify and remove Gaussian noise components. The algorithm is tested on ECG signals with different levels of signal-to-noise ratio, and signal improvement is measured using SNR improvement and percent root mean square difference. Results show the method effectively de-noises ECG signals.
An Experimental Study on Strength Properties of Concrete When Cement Is Parti...IOSR Journals
This study investigated the strength properties of concrete when cement is partially replaced with two types of sugarcane bagasse ash (SBA): raw SBA (B.A.1) and SBA heated to 8500C (B.A.2). Cubes, cylinders and beams were tested after 28 days of curing. For B.A.1, maximum strengths were achieved at 5% replacement, while for B.A.2 maximum compressive strength was at 15% replacement, tensile at 20%, and flexural at 30% replacement. Results showed that concrete with B.A.2 generally had higher strengths than with B.A.1, indicating that heating SBA improves its pozzolanic
Synthesis, Structure Investigation and Dyeing Assessment of Novel Bisazo Disp...IOSR Journals
Novel bisazo-disperse dyes were prepared by the coupling of diazotized solutions of various aromatic diamines with 2,4-dihydroxybenzophenone. The resultant bisazo disperse dyes were characterized by elemental analysis, IR and 1H NMR spectral studies. The UV Visible absorption spectral data were investigated in dimethylformamide. and are discussed in terms of structural property relationship. Their dyeing assessment of bisazo disperse dyes has been made on polyester fabrics. The results show that a better hue was obtained on polyester fabrics and have mild to moderate fastness properties.
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...IOSR Journals
For the first time in solar physics, this paper reports a comprehensive study how 235Uranium fission
causes Sunlight by the atomic phenomenon, Padmanabha Rao Effect against the theory of fusion. The first major
breakthrough lies in identifying as many as 153 solar lines in the Bharat Radiation range from 12.87 to 31 nm
reported by various researchers since 1960s. The Sunlight phenomenon is explained as follows. For example, the
energy equivalence 72.48 eV of the most intense 17.107 nm emission in the middle of solar spectrum is the energy
lost by β, γ, or X-ray energy of a fission product while passing through core-Coulomb space. This energy loss is the
Bharat Radiation energy that cause EUV, UV, visible, and near infrared emissions on valence excitation. From vast
data of emissions and energies of various fission products, 606.31 keV β (Eβmax) energy of 131I was chosen as the
source of 17.107 nm emission. For the first time a typical Bharat Radiation spectrum was observed when plotted
energy loss against β, γ, or X-ray energies of fission products supposedly present in solar flare and atmosphere :
113Xe, 131I, 137Cs, 95Zr, 144Cs, 134I, 140Ba, 133I, 140La, 133In etc that caused solar lines. Consistent presence of a sharp
line for four months in AIA spectral EUV band at 335A exemplifies self-sustained uranium fission from a small site
appeared in SDO/AIA image at 304A. Sun’s dark spot is explained as a large crater formed on Sun’s core surface as
a result of fission reaction that does not show any emission since fission products would be thrown away from the
site during fission. Purely the same Sun’s core material left over at the site after fission reaction devoid of fission
products and any emission seems to be the familiar dark Matter. This could be the first report on the existence of
Sun’s Dark Matter.
Prime factors of Vendor Selection for Indian Telecom Service Provider for eff...IOSR Journals
Abstract: To have a effective supply chain it is very much essential to have effective and reliable vendor. It is
far more important in case of a service sector. As service is intangible and can only be felt ;hence very much
depends on the quality of delivery and after sales activity. Ineffective and unreliable vendor can have a
cascading effect in all aspect of service chain resulting customer dissatisfaction. The present study tries to find
out the parameter or quality of a vendor that is preferred by telecommunication companies. As
telecommunication is a infrastructure service any weak link in the supply chain will have a catastrophic impact
on the end user. As vendor is one of the prime component of supply chain its careful selection is of immense
importance. There are numerous variables to select a vendor. But to have a quick and effective decisions
making these numerous variables are reduced to few factors. In this study the centroid method of factor analysis
is used to find four important factors. The study was carried out by interacting executives of around 8 telecom
companies amounting to 57 effective data. A broad outline of factors and encompassing variables under each
factor were depicted.
Keywords - Factor analysis, Supply Chain and Vendor selection,
Implications of Organisational Culture on Performance of Business OrganisationsIOSR Journals
This article discusses the implications of organizational culture on the performance of business organizations in Nigeria. The first objective of the paper is to elaborate on organisational culture as a determinant of organisational performance. The second objective is to identify four dimensions of African culture as bases for more effective organization culture in the Nigerian context. Works of well known authors in the fields of Culture and Management were reviewed for perspectives and evidence. It is shown from the reviews that a relationship exists between organisational culture and performance of business organisations. In addition, the review suggests that relationship is mediated by reward perception and role perception. Social support, accommodation at work places, religious referencing, supervisor-subordinate age ratio and ethnic diversification are identified as culture factors likely to have positive impact on the performance of business organisations in Nigeria. It is recommended that business organizations in the country should give adequate attention to the development of corporate cultures that integrate the above factors in order to enhance their performance.
Analysis Of Lpg Cylinder Using Composite MaterialsIOSR Journals
This paper aims is innovation of alternative materials of Liquid petroleum gas (LPG). So, the finite
element analysis of Liquefied Petroleum Gas (LPG) cylinders made of Steel and Fiber Reinforced Plastic (FRP)
composites has been carried out. Finite element analysis of composite cylinder subjected to internal pressure is
performed. Layered shell element of a versatile FE analysis package ANSYS (version 11.0) has been used to
model the shell with FRP composites.
A number of cases are considered to study the stresses and deformations due to pressure loading inside the
cylinder. First, the results of stresses and deformation for steel cylinders are compared with the analytical
solution available in literature in order to validate the model and the software. The weight savings are also
presented for steel, Glass Fiber Reinforced Plastic (GFRP) composites LPG cylinders. Variations of stresses
and deformations throughout the cylinder made of steel and GFRP are studied.
Post Endodontic Restoration: Are You Serious?IOSR Journals
After root canal obturation of sound posterior teeth, dentists are always in hurry of giving full
crown. They are not serious in giving proper post endodontic restoration which results in fracture of tooth or
restoration, if patient delays the full crown treatment. The inherent causes of failures are rarely evaluated.
Thus, it was the purpose of this study to analyze the opinion of practicing dentist and after 24 months of clinical
observation to present a logical approach to this subject as the final success of endodontic treatment is depend
on the proper and timely coronal restoration.
Asif’s Equation of Charge Variation and Special RelativityIOSR Journals
The theory of special relativity plays an important role in the modern theory of classical electromagnetism. Considering deeply the effect of Special relativity in Electromagnetism, when a charge particle moves with high speed as comparable to the speed of light in vacuum tube or in space under influence of electromagnetic field, its mass varies under Lorentz transformation [1].The question arises that does its charge vary under Lorentz transformation? In this paper, Asif's equation of charge variation demonstrates the variation of electric charge under Lorentz transformation. The more sophisticated view of electromagnetism expressed by electromagnetic fields in moving inertial frame can be achieved by considering some relativistic effect including charge as well. One can easily achieve the mass-energy relation from Asif’s equation of charge variation as proved in this paper.
Dust Interception Capacity And Alteration Of Various Biometric And Biochemica...IOSR Journals
The dust accumulation capacity of Ficus carica L. was evaluated from eight different sites in and around Multan. The impact of dust accumulation was observed via various biometric attributes (leaf area, leaf fresh and dry weights) and biochemical attributes (chlorophyll contents, carotenoids & ascorbic acid) from leaves of F. carica. The maximum dust accumulation was occurred in the plants growing at Road sides while, the minimum dust was found on plants growing at Bahauddin Zakariya University. Dust accumulation has caused a significant effect on almost all foliage and biochemical attributes of F. carica. A positive correlation was found between dust accumulation and biometric attributes in F. carica. Biochemical responses had shown an inconsistency as chlorophylls (a, b & total), carotenoids decreased and ascorbic acid contents increased with an increase in dust accumulation. A negative correlation was found between dust deposition and chlorophyll contents. Whereas, accumulation of ascorbic acid was associated with a decline in pigment contents
Electrophoretic Patterns of Esterases in Eri silkworm Samia Cynthia riciniIOSR Journals
The present study was carried out to investigate the patterns of esterase isozymes extracted from the silk gland, haemolymph and mid gut of Eri silkworm (Samia Cynthia ricini). The qualitative analysis of esterases was carried out by 7.5% of native Polyacrylamide Gel Electrophoresis (PAGE). The inhibitor sensitivity of the enzymes towards paraxon, eserine and pCMB was used to classify the individual zones of esterases. Three zones of esterases were observed in different tissues of Eri silkworm. Silk gland esterases were classified as CHsp (Cholinesterase like enzymes) esterases. The haemolymph and mid gut esterases were classified into Esdp (Enzyme inhibited by paraxon and pCMB).
“Comparitive Study of Prevalence of Hyperlactatemia in HIV / AIDS Patients re...IOSR Journals
Hyperlactatemia is one of the important metabolic abnormalities in HIV infected patients. The
prevalence of hyperlactatemia in natural course of HIV disease is approximately about 2%. Aim of this study is
to estimate the prevalence of hyperlactatemia in HIV patients receiving two antiretroviral regimens, advocated
by NACO by monitoring the plasma lactate levels. This study was taken up with 200 patients to compare the
prevalence of hyperlactatemia of two commonly used NACO regimens (zidovudine+ lamivudine+ nevirapine)
Vs (stavudine+ lamivudine+ nevirapine). The plasma lactate levels were estimated between 9th to 18thmonth
after initiation of antiretroviral therapy. The comparision and correlation between plasma lactate levels, CD4
counts and haemoglobin percentage in both regimens was done. There was statistically significant rise in the
plasma lactate levels (p<0.05) in both regimens. The increase in plasma lactate levels is more in stavudine
group compared to zidovudine group. There was low degree of positive correlation between plasma lactate and
haemoglobin in Stavudine group but negative correlation between Plasma lactate and CD4 counts in both
groups. More focus is needed on Pharmacovigilance of NRTIs induced hyperlactatemia especially Stavudine.
Improving Sales in SME Using Internet MarketingIOSR Journals
Abstract : In Indonesia, SMEs are the backbone of the Indonesian economy. Number of SMEs until 2011 to
reach around 52 million. SMEs in Indonesia is very important for the economy because it accounts for 60% of
GDP and 97% of the workforce holds. But access is limited to financial institutions only 25% or 13 million
SMEs who have access to financial institutions. Indonesian government, SMEs, through the Department of
Cooperatives and SMEs, in each province or regency / city.
Although Small and Medium Enterprises (SMEs) is driving the nation's economy, but in reality many of
the problems SMEs are still entangled. The main thing to note is the ability of SMEs to access a wider market.
Because of the ability to change and adapt to a changing environment will determine the existence of small
businesses in the nation's economy. In the end, the existence of small businesses that have high competitiveness
will strengthen the nation's economy as a whole. Thus, in this study will use an appropriate technology tools
that can provide assistance in introducing products through internet and increase sales in each SME
This study uses a sample of students at the State University of Malang that can make a significant
contribution in the small and medium businesses that are being initiated by students.
Keywords: Small Medium Enterprise, Internet Marketing, Sales Improvement
The influence of Rolling process on the porosity and wear behavior of Spray-f...IOSR Journals
Spray forming, also called spray casting or spray deposition, is the inert gas atomization of a liquid metal stream into variously sized droplets. These droplets are interrupted by a substrate which collects and solidifies the droplets into coherent, near fully dense perform. The present work concerns with this techniques. This technology was applied to produce Al-6%Si-20%Pb alloys. The spray droplets were deposited over a copper substrate to achieve a disc shape perform. After spray deposition samples were rolled at room temperature on two high rolling mills and total porosity and wear characteristic of spray deposits were studies. The total porosity decreases with the increase in the percentage of reduction in thickness of the samples. Thickness of the samples in both middle and peripheral region. Wear testing of spray formed and rolled Al-Si-Pb alloy were investigated on a pin on disc type wear machine. Wear rate behavior with applied load and increase in percentage of reduction in thickness of samples was observed. Wear rate increased with increasing the load and decreased with increase in percentage of reduction in thickness of the sample.
Uranium Concentrations measurement for Ground Water and Soil Samples in Al-Na...IOSR Journals
In this work, Uranium concentrations in groundwater and soil samples from some areas of Al-Najaf city, Iraq were measured solid state nuclear track detector (CR-39) detector technique. The uranium concentration in groundwater samples was found to vary from (1.617782869±0.04342) μgl−1 to (5.079235843±0.137827) μgl−1, while in soil samples vary from (0.093558±0.000938) ppm to (0.184325±0.017511) ppm.
This study showed that levels of uranium concentration in groundwater and soil of study area of were compared with safe limit values recommended by WHO and UNSCEAR below the safe limit
Sensitivity Analysis of Process Parameters for Polyurethane Based Panel Air F...IOSR Journals
This document summarizes research conducted on the sensitivity of process parameters for polyurethane-based panel air filters. Experiments varied parameters like nucleation, mixing speed, mold temperature, mixing ratio, and analyzed their effects on density, hardness, and rise time. Increasing nucleation and mold temperature decreased density and hardness. Higher mixing speeds had little effect with nucleation but decreased density without. Density decreased and hardness was stable at standard mixing ratios but varied above and below. The goal is to define optimized parameter settings to minimize defects for high productivity and yield.
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverIOSR Journals
Abstract: Monitoring Receivers form an important constituent of the Electronic support. In Monitoring
Receiver we can monitor, demodulate or scan the multiple channels.
In this project, the Implementation of algorithm for multi channel digital monitoring receiver. The
implementation will carry out the channelization by the way of Digital down Converters (DDCs) and Digital
Base band Demodulation. The Intermediate Frequency (IF) at 10.7 MHz will be digitalized using Analog to
Digital Converter (ADC) with sampling frequency 52.5 MHz and further converted to Base band using DDCs.
Virtually all the digital receivers perform channel access using a DDC. The Base band data will be streamed to
the appropriate demodulators. Matlab Simulink will be used to simulate the logic modules before the
implementation. This system will be prototyped on an FPGA based COTS (Commercial-off-the-shelf)
development board. Xilinx System Generator will be used for the implementation of the algorithms.
Keywords: DDC, ADC, Digital Base band demodulation, IF, Monitoring Receiver.
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...IOSR Journals
During the history,different elements have been determined as influential factors affecting the
architecture in different areas. The historical events and political alterations as well as religious and
economical changes can directly lead to the architecture style. One of the historical countries with rich
architectural history that can be increasingly exposed to more alterations is Iran. In general the architecture
styles in Iran can be categorised in six groups. These groups can be divided in two periods before and after
Islam’s emergence in Iran. The “Parsi” and “Parti” architecture styles belong to the former period and
“Razi”, “Khorasani”, “Isfahani” and “Azari” were common in the latter period, after Islam. Such alterations
brought in a variety of architecture styles, in this country, due to theoretical alterations. Furthermore, some
novel architectural styles were resulted from a number of physical conditions which had also effects on the
theoretical architecture. The current research intends to put an emphasize on the alterations in materials used
in two historical periods of Iran, “Achaemenid” Empire (550–330 BCE) and The “Sassanid” Empire (224 CE
to 651 CE) resulting in the changes in Iranian architecture. It also aims to explore the differences and the
reasons of changes in the materials used for constructions and the influence that these changes had on the
architectural style in the above mentioned periods
The need for a rapid, famous method for hair removal has led to the development of various laser for
hair removal. These include ruby, alexandrite, diode, and Nd:YAG lasers. This research discusses the basic
principles of laser hair removal, examines theoretically the properties of specific laser systems, and focuses on
patient selection and treatment protocols for the various systems designed to ensure safe and effective treatment.
bT-Locally Closed Sets and bT-Locally Continuous Functions In Supra Topologic...IOSR Journals
The aim of this paper is to introduce a decompositions namely supra bT- locally closed sets and define supra bT-locally continuous functions. This paper also discussed some of their properties.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
A New Technique to Digital Image Watermarking Using DWT for Real Time Applica...IJERA Editor
Digital watermarking is an essential technique to add hidden copyright notices or secret messages to digital audio, image, or image forms. In this paper we introduce a new approach for digital image watermarking for real time applications. We have successfully implemented the digital watermarking technique on digital images based on 2-level Discrete Wavelet Transform and compared the performance of the proposed method with Level-1 and Level-2 and Level-3 Discrete Wavelet Transform using the parameter peak signal to noise ratio. To make the watermark robust and to preserve visual significant information a 2-Level Discrete wavelet transform used as transformation domain for both secret image and original image. The watermark is embedded in the original image using Alpha blending technique and implemented using Matlab Simulink.
A Review on Robust Digital Watermarking based on different Methods and its Ap...IJSRD
Digital Watermarking is the process of embedding data called watermark or signature or label or tag into a multimedia object (image or audio or video) so that the watermark can be extracted for ownership verification or authentication. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modification made to the pixel value is perceptually not noticed and it can be recovered only with an appropriate decoding mechanism. Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the signal but protect the ownership of the content. One of the current research areas is to protect digital watermark inside the information so that ownership of the information cannot be claimed by third party.
This document presents an algorithm for imperceptibly embedding a DNA-encoded watermark into a color image for authentication purposes. It applies a multi-resolution discrete wavelet transform to decompose the image. The watermark, encoded into DNA nucleotides, is then embedded into the third-level wavelet coefficients through a quantization process. Specifically, the watermark nucleotides are complemented and used to quantize coefficients in the middle frequency band, modifying the coefficients. The watermarked image is reconstructed through inverse wavelet transform. Extraction reverses these steps to recover the watermark without the original image. The algorithm aims to balance imperceptibility and robustness through this wavelet-based, blind watermarking scheme.
A Wavelet Based Hybrid SVD Algorithm for Digital Image Watermarkingsipij
In this paper we propose a hybrid image watermarking algorithm which satisfies both imperceptibility and robustness requirements. Our proposed work provide an optimum solution by using singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark. Further to increase and control the strength of the watermark, we use a scale factor. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. Experimental results are provided in terms of peak signal to noise ratio (PSNR), normalized cross correlation (NCC) and gain factor to demonstrate the effectiveness of the proposed algorithm. Image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.
Commutative approach for securing digital mediaijctet
This document summarizes a paper on digital image watermarking techniques. It discusses how digital watermarking can be used to embed hidden information in multimedia data like images, audio, and video to identify ownership and protect against illegal copying. It describes different watermarking techniques including the discrete cosine transform (DCT) and discrete wavelet transform (DWT). The paper analyzes the DCT and DWT techniques, evaluating them using peak signal-to-noise ratio at different threshold values. It finds that the DWT technique provides better image quality than DCT. The document also discusses applications of digital watermarking like ownership assertion, fingerprinting, copy prevention and control, fraud detection, and ID card security.
Digital video watermarking scheme using discrete wavelet transform and standa...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses and compares two digital image watermarking techniques: discrete cosine transform (DCT) domain watermarking and discrete wavelet transform (DWT) domain watermarking. It first provides background on digital watermarking and explains watermark embedding and extraction processes in both the spatial and frequency domains. It then proposes a specific DCT watermarking technique that embeds a watermark by modifying mid-band DCT coefficients of divided image blocks. A DWT watermarking technique is also proposed that embeds a watermark in the LH sub-band of the DWT. Finally, the document indicates that experimental results will be used to compare the robustness of the two techniques against various attacks.
The embedding of a digital signature, or tag data is carried out in the frequency domain. The
high frequency varieties are chosen by any LH and HL in the wavelet domain which are to be
applicable in DCT. Coefficients are changed mid-frequency DCT coefficients such transactions by a
low frequency of the watermark to be embedded. Watermark can be recovered from the video by
selecting a random watermark of any reference framework. The proposed techniques are more
secure, robust and are efficient due to the use of static DCT. Watermark techniques uses a bands HL
and LH for adding watermark where the movement does not impact the quality the extracted
watermark until if the video displays for different types of malware attacks.
In this work we have taken three video watermarking techniques i.e. BIT GET (spatial),
DWT, DCT and one video formats ie.MPEG video to perform a comparative analysis of different
techniques using single video formats, to obtain the best performing technique for video
watermarking. Such that to increase robustness of the video and decrease the embedding time
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing day by day. So it becomes very essential to protect multimedia information from piracy and also it is challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of their information. Hence, facing all these kinds of problems development of the techniques is very important. Digital watermarking considered as a solution to prevent the multimedia data. In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method, the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying the singular values of these bands. Extraction of watermark is performed by the inversion of watermark embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that ensures good imperceptibility and more robustness against different kinds of attacks.
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
With the rapid development of information technology and multimedia, the use of digital data is increasing
day by day. So it becomes very essential to protect multimedia information from piracy and also it is
challenging. A great deal of Copyright owners is worried about protecting any kind of illegal repetition of
their information. Hence, facing all these kinds of problems development of the techniques is very
important. Digital watermarking considered as a solution to prevent the multimedia data.
In this paper, an idea of watermarking is proposed and implemented. In proposed watermarking method,
the original image is rearranged using zigzag sequence and DWT is applied on rearranged image. Then
DCT and SVD are applied on all high bands LH, HL and HH. Watermark is then embedded by modifying
the singular values of these bands. Extraction of watermark is performed by the inversion of watermark
embedding process. For choosing of these three bands it gives facility of mid-band and pure high band that
ensures good imperceptibility and more robustness against different kinds of attacks.
Comparison of Invisible Digital Watermarking Techniques for its RobustnessIRJET Journal
This document compares two digital image watermarking techniques, discrete cosine transform (DCT) and discrete wavelet transform (DWT), to analyze their robustness. The techniques are implemented in MATLAB to embed a watermark into an original image. Various attacks are performed on the watermarked images and the correlation between the original and extracted watermarks is calculated. The results show that the DWT technique maintains a higher correlation than DCT after attacks like JPEG compression, indicating it is more robust to distortions.
Advance Digital Video Watermarking based on DWT-PCA for Copyright protectionIJERA Editor
This document presents a digital video watermarking technique based on discrete wavelet transform (DWT) and principal component analysis (PCA). It begins with an introduction to digital watermarking and an overview of spatial and transform domain watermarking methods. The document then describes DWT and PCA in more detail. It presents a watermarking scheme that uses DWT to decompose video frames into frequency subbands, and embeds a watermark into the principal components of the low frequency subband after applying PCA. Experimental results on a test video show the watermarked frames have no visible quality differences from the original and the watermark is robust to various attacks. The technique achieves imperceptibility measured by high peak signal-to-
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
The widespread of global internet has led to the need for developing new
methods of protecting multimedia information from exploitation, alteration
or forgery, illegal distribution, and manipulation. An attacker is quickly and
illegally distributing or changing multimedia information by using various
means of computer technology. For detecting this manipulation, this paper
suggests blind watermark image inside a host image for observing in the
receiver. If the watermark image was retrieved, then the host image was not
attacked or manipulated. While if not retrieved, in this case, the image was
attacked. The proposed method is depending on a decomposition of the host
image using lowest energy sub-bands of contourlet transform (4-levels), with
scrambling by ikeda map of the watermark image, and selecting new
positions by modified arnold cat map. This will produce more security and
safety, as well as provide more difficulty or prevent hacking. The obtained
results confirm the robustness against attacks and more effectiveness of the
presented scheme compared with the other similar works. Also, using lowest
energy sub-bands will expand area of embedding and this part will be
considered in the future works with the color images.
A review-on-digital-image-watermarking-techniquesEditor IJMTER
Due to the rapid expansion in internet technology copyright protection and data
authenticity are two major problems in handling digital multimedia. Watermarking is a very
important field for copyrights of various electronic documents and media. A variety of
techniques have been proposed for copyright protection of digital images which include
spatial domain and transform domain watermarking. This paper aims to provide some basic
concepts of digital image watermarking techniques and comparisons between them.
This document discusses an enhanced technique for secure and reliable watermarking using Modified Haar Wavelet Transform (MFHWT). The proposed technique embeds a watermark into an original image using discrete wavelet transform (DWT) and wavelet packet transform (WPT) according to the size of the watermark. MFHWT is a memory efficient, fast, and simple transform. The watermarking process involves embedding and extraction processes. Various watermarking techniques in different transform domains are discussed, including DWT and WPT. The proposed algorithm uses MFHWT for decomposition and reconstruction. Image quality is measured using metrics like MSE and PSNR, with higher PSNR indicating better quality. The technique achieves robustness
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
This document summarizes a research paper on lossless reversible visible watermarking. It begins with an abstract that describes digital watermarking techniques and introduces a new approach for lossless reversible visible watermarking with robust security. It then provides a literature review of previous lossless invisible and visible watermarking techniques. The proposed technique aims to allow legitimate users to remove embedded watermarks and perfectly recover the original image content. Finally, it outlines the system architecture and provides a mathematical model for the watermark generation, embedding, and extraction processes.
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document proposes a hybrid digital watermarking scheme that uses both discrete wavelet transform (DWT) and singular value decomposition (SVD) for color image authentication.
2) In the proposed scheme, the watermark is embedded in the singular values of the DWT sub-bands of the cover image, rather than directly on the wavelet coefficients. This reduces computational expense compared to other DWT-SVD methods.
3) Experimental results on test images show that the hybrid DWT-SVD scheme provides better imperceptibility and robustness against various attacks compared to using DWT or SVD alone. The recovered watermarks had high quality even after the watermarked images were distorted.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 1 (Sep. - Oct. 2013), PP 07-11
www.iosrjournals.org
www.iosrjournals.org 7 | Page
Digital Image Watermarking Basics
Senthil Nathan.M1
, Pandiarajan.K2
, Baegan.U3
1,2 & 3
Student, III year Electronics & Communication,Karpagam College of Engineering,Coimbatore,India.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the
need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques -
digital image watermarking. Through this paper we will explore some basic concepts of digital image
watermarking techniques.Two different methods of digital image watermarking namely spatial domain
watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two
different algorithms for a digital image watermarking have also been discussed. Also the comparision between
the different algorithms,tests performed for the robustness and the applications of the digital image
watermarking have also been discussed.
I . Introduction
There are three basic methods of secure communication available, namely, cryptography,
steganography and watermarking [1]. Among these three, the first one,cryptography, deals with the development
of techniques for converting information between intelligible and unintelligible forms during information
exchange that deals with the content confidentiality and access control. By using cryptography, only authorized
parties holding decryption keys can access the content (text or image). It provides the tools to secure sensitive
information. Steganography, on the other hand, is a technique for hiding and extracting information to be
conveyed using a carrier signal.
A watermarking system must allow for a useful amount of information to be embedded into the image.
Digital watermarking is the process of embedding information into digital multimedia content such that the
information (which we call the watermark) can later be extracted or detected for a variety of purposes including
copy prevention and control. Digital watermarking has become an active and important area of research,
development and commercialization of watermarking techniques is being deemed essential to help address some
of the challenges faced by the rapid proliferation of digital content.
The most important properties of any digital watermarking techniques are robustness, security,
imperceptibility, complexity, and verification. Robustness is defined as if the watermark can be detected after
media operations such as filtering, lossy compression,color correction, or geometric modifications. Security
means that the embedded watermark can’t be removed beyond reliable detection by targeted attacks.
Imperceptibility means that the watermark is not seen by the human visual system. Complexity is described as
the effort and time required for watermark embedding and retrieval. Lastly,verification is a procedure whereby
is used as a private key or public key function. Each of these properties must be taken into consideration when
applying a certain digital watermarking technique [2]. Watermarking techniques can be classified according to
the nature of data (text, image, audio or video), or according to the working (spatial or frequency) domain, also
they can be classified according to the human perception (robust or fragile) [3]. In images, the watermarking
techniques can be broadly classified into three types: (i) Visible watermark, (ii) Invisible fragile watermark and
(iii) Invisible robust watermark [2], [3], which has wider currency and use. However all these mentioned classes
can be applied by using software, hardware or both together. Fig. 1 illustrates a generic watermarking
scheme.there are two watermarking techniques using software namely spatial domain and transform domain.
Fig .1. Generic watermarking scheme [14]
2. Digital Image Watermarking Basics
www.iosrjournals.org 8 | Page
II . Spatial Domain
An analogue image can be described as a continuous function over a two-dimensional surface. The
value of this function at a specific coordinate on the lattice specifies the luminance or brightness of the image at
that location. A digital image version of this analogue image contains the sampled values of the function at
discrete locations or pixels. These values are said to be the representation of the image in the spatial domain or
often referred to as the pixel domain. Spatial embedding inserts message into image pixels. The oldest and the
most common used method in this category is the insertion of the watermark into the least significant bits (LSB)
of pixel data [4][5][6].
In [7] they have implemented a simplest model of watermark technique. It has the ability to insert an
invisible watermark into a spatial domain of a base-image. This technique yields marked-images with high
imperceptibility and robustness quality. The algorithm provides high level of security by generating encryption
key which is used to extract the watermark later; also, the algorithm is able to randomize the location of the
watermark in different base-images.
III . Transform Domain
Transform domain embeds a message by modifying the transform coefficients of the cover message as
opposed to the pixel values. Ideally, transform domain has the effect in the spatial domain of apportioning the
hidden information through different order bits in a manner that is robust. There are a number of transforms that
can be applied to digital images, but there are notably three most commonly used in image watermarking. They
are Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform
(DWT).
A . DISCRETE FOURIER TRANSFORM
Fourier Transform (FT) is an operation that transforms a continuous function into its frequency
components. The equivalent transform for discrete valued function requires the Discrete Fourier Transform
(DFT). In digital image processing, the even functions that are not periodic can be expressed as the integral of
sine and/or cosine multiplied by a weighing function. This weighing function makes up the coefficients of the
Fourier Transform of the signal. Fourier Transform allows analysis and processing of the signal in its frequency
domain by means of analyzing and modifying these coefficients.
Pereira proposed a method for copyright protection by embedding a digital watermark in the DFT domain
[8]. The properties of this technique based on polar maps for the accurate and efficient recovery of the template
in an image which has undergone a general affine transform. In this technique, the watermark is composed of 2
parts: one is a template which contains no information in itself but can detect any transformations undergone by
the image, and another one is a spread spectrum message that contains the hidden information. The length of the
hidden information is supposed to be short and it is subjected to a preprocessing algorithm to produce the new
message of length. Prior to embedding the hidden message, the luminance component of the cover image is
extracted and is used to calculate the DFT coefficients. The hidden data and the template are then embedded in
these coefficients. The template is embedded along 2 lines in the cover image which go through the origin and
its purpose is to detect any attacks (transformation) the image has undergone
B . DISCRETE COSINE TRANSFORM
Discrete Cosine Transformation (DCT) transforms a signal from the spatial into the frequency domain
by using the cosine waveform. DCT divide the information energy in the bands with low frequency and DCT
popularity in data compression techniques such as JPEG and MPEG.The DCT allows an image to be broken up
into different frequency bands, making it much easier to embed watermarking information into the middle
frequency bands of the image. Here the middle frequency bands chosen such that they minimize to avoid the
visual important parts of the image (low frequencies) without over-exposing themselves to removal through
compression and noise attacks (high frequencies). FL is use to denote the lowest frequency components of the
block, while FH is used to denote the higher frequency components. FM is Chosen as the embedding region as
to provide additional resistance to lossy compression techniques [9].
Chandra have proposed a robust watermarking method using MDKP [10].it has greatest robustness
against various attacks and preserves the image quality after water marking. It embeds a watermark into an
image in DCT domain. The image is divided into blocks and each block is processed using Multi Dimensional
Knapsack Problem (MDKP) and in turn converts to spatial domain. The watermark is extracted from the image
and compared with the original image. The measurement of quality of image is also concerned. this scheme
exhibits better performance in robust digital watermarking.
3. Digital Image Watermarking Basics
www.iosrjournals.org 9 | Page
C . DISCRETE WAVELET TRANSFORM
Wavelet transform decomposes an image into a set of band limited components which can be
reassembled to reconstruct the original image without error. Since the bandwidth of the resulting coefficient sets
is smaller than that of the original image, the coefficient sets can be down sampled without loss of information.
Reconstruction of the original signal is accomplished by up sampling, filtering and summing the individual sub
bands. The basic idea of discrete wavelet transform(DWT) in image process is to multi-differentiated
decompose the image into sub-image of different spatial domain and independent frequency district [11][12].
Then transform the coefficient of sub-image. After the original image has been DWT transformed, it is
decomposed into 4 frequency districts which is one low-frequency district(LL) and three high-frequency
districts(LH,HL,HH). If the information of low-frequency district is DWT transformed, the sub-level frequency
district information will be obtained. A two-dismensional image after three-times DWT decomposed can be
shown as Fig.2. Where, L represents low-pass filter, H represents high-pass filter. An original image can be
decomposed of frequency districts of HL1, LH1, HH1. The low-frequency district information also can be
decomposed into sub-level frequency district information of LL2, HL2, LH2 and HH2. By doing this the
original image can be decomposed for n level wavelet transformation. The informaton of low frequency district
is a image close to the original image. Most signal information of original image is in this frequency district.
The frequency districts of LH, HL and HH respectively represents the level detail, the upright detail and the
diagonal detail of the original image.
In [13] Shivani Garg proposed a new model for the DWT method of watermarking. The Proposed
method decomposes cover image (original image), which is to be watermarked using DWT. The watermark is
embedded to the specified DWT coefficient of the cover image. A new DWT based spread spectrum
watermarking technique is proposed on the basis of embedding of various sequences in the DWT coefficients.
The algorithm is Column wise DWT Coefficients Embedding Algorithm (CCE). In this method columns of
DWT coefficients are taken for watermarking. The proposed algorithm is experimented on different sequences.
Performance of the algorithm is analyzed by varying the gain factor and by inserting different sequences.
Simulation results show that the proposed method achieves higher security and robustness especially in the case
of Kasami sequence.
Fig . 2 sketch map of image DWT decomposed
IV . Watermarking Algorithms
A . SPATIAL DOMAIN ALGORITHM
Embedding algorithm [14]
1) Reorganize size of the base-image to be [M × M].
2) Reset the contents of the LSB plane in the baseimage.
3) Reorganize color and size of the watermark to be [N × N] gray image.
4) Extract the all bit plane details from the watermark.
5) Shift the extracted values to right.
6) Add the shifted bit plane of the watermark into the LSB plane of the base-image.
7) Repeat steps (4th, 5th and 6th) m-times.
8) Finally, result is a watermarked-image.
Note that: watermarks’ size should not exceed baseimages’
size, e.g. ([N × N] = [M × M] / m).
Extraction algorithm
1) Extract the LSB bit plane from the marked image.
2) Shift the extracted contents by left.
3) Repeat 1st and 2nd steps, (m) times.
4. Digital Image Watermarking Basics
www.iosrjournals.org 10 | Page
4) Result is watermark retrieved.
B . FREQUENCY DOMAIN ALGORITHM
Embedding algorithm [14]
1) Reorganize color and size of the base-image to be [M ×M] gray color.
2) Compute 2D wavelet transform for the base-image.
3) Initiate the weight of the watermarking.
4) Reorganize size and color of the watermark to be [M ×M] gray image.
5) Divide the transformed base-image into 4-blocks, namely, LL, LH, HL and HH respectively.
6) Multiply watermark by watermarking weight and then add the result to the blocks of the base-image.
7) The inverse wavelet transform is then taken to get the watermarked-image.
Extraction algorithm
On the other hand the extraction algorithm can be done by taking the forward wavelet transform of the
watermarked image and then subtracted it from the base-image to get the watermark.
V. Watermarking Robustness Test
Many different methods can be used to test whether a watermark can survive different changes to the
image it is
embedded in. Here is a browsing of the popular of these methods [3]:
Horizontal Flipping: Many images can be flipped horizontally without losing quality. Few
watermarks survive flipping, although resilience to flipping is easy to implement.
Rotation & Cropping: A small rotation with cropping doesn’t reduce image quality, but can make
watermarks undetectable as rotation realigns horizontal features of an image used to check for the presence of a
watermark.
JPEG Compression/Re-compression: JPEG is a widely used compression algorithms for images and
any watermarking system should be resilient to some degree to compression or change of compression level.
Scaling: Uniform scaling can increase/decrease an image by the same (%) rate in the horizontal and
vertical directions. Non-uniform scaling can increase/decrease the image horizontally and vertically at different
(%) rates. Digital watermarking methods can be resilient only to uniform scaling.
5) Dithering: It approximates colors by alternating two available similar colors from pixel to pixel. If
done correctly this method can completely obliterate a watermark, however it can make an image appear to be
“patchy” when the image is over-dithered.
6) Mosaic: A mosaic attack doesn’t damage the watermarked-image or make it lose quality in any way,
but still enables the image to be viewed in. To the viewer a “mosaic” image appears to look the same as the
original. This means that the watermark cannot be detected, as a problem common to all image watermarking
schemes is that they have trouble embedding watermarks into small images, (less than 256 pixels in height or
width).
VI . Comparision
Advantages of DWT over DCT:
Wavelet transform understands the HVS more closely than the DCT.
Wavelet coded image is a multi-resolution description of image. Hence an image can be shown at
different levels of resolution and can be sequentially processed from low resolution to high resolution [15].
Disadvantages of DWT over DCT:
Computational complexity of DWT is more compared to DCT'. As Feig (1990) pointed out it only takes
54 multiplications to compute DCT for a block of 8x8, unlike wavelet calculation depends upon the length of
the filter used, which is at least 1 multiplication per coefficient.
Advantages of DFT over DWT and DCT:
DFT is rotation,scaling and translation (RST) invariant. Hence it can be used to recover from geometric
distortions, whereas the spatial domain, DCT and the DWT are not RST invariant and hence it is difficult to
overcome from geometric distortions [15].
VII . Digital Watermarking Applications
Digital image watermarking have a wide range of applications in the field of digital multimedia.The
following are some of the applications of digital image watermarking [16].
5. Digital Image Watermarking Basics
www.iosrjournals.org 11 | Page
A . Copyright protection: The most important application of watermarking is to provide copyright protection.
Copyright protection requires high level of robustness so that the embedded watermark can not be removed
without data distortion This watermark is extracted to show as proof if someone claims the ownership of the
data.
B . Finger Printing: A robust watermarking algorithm is required for this application. Watermark is embedded
in digital data to trace the source of illegal copies. Information related to customer like serial number or
customer identity information is used as watermark.
C . Content Authentication (integrity protection): The objective of this application is to detect modification
in data. To verify the authenticity of the received data watermark is embedded in host data. A fragile
watermarking algorithm is required in this case.
D . Broadcast Monitoring:The main use of broadcast monitoring is to protect TV products like news items
from illegal transmission . Watermark is embedded in commercial advertisements. Automated monitoring
system can verify
whether the advertisements are broadcasted as contracted or not.
E . Indexing: Search engine use this technique to retrieve the required data in a short period of time and without
any ambiguity. In indexing, Comments and markers or key information related to the data is inserted as
watermark.
VIII . Conclusion
This paper presents an overview of digital image watermarking. First we introduced the various
watermarking techniques and classified them into three types: visible watermark, invisible fragile watermark
and invisible robust watermark. Spatial domain and transform domain watermarking are briefly discussed
here.Two different algorithms for the digital image waterwarking are also been discussed.Comparisions between
the various watermarking technologies are also been reviewed.Thus the digital image watermarking proves to be
a promising technology for the pupose of data hiding.
REFERENCES
[1]. N. S. Kulkarni, I. Gupta, and S. N. Kulkarni “A Robust Image Encryption Technique based on Random Vector” , IEEE Computer
Society. IEEE conference publications,in international conference on Emerging trends in engineering and technology (ICETET),pp.
15-19,2008.
[2]. P.B.Khatkale, D.G.Lokhande, Srescoe, “Digital Watermarking Algorithm for Color Images”, IOSR Journal of Engineering
(IOSRJEN) ,Vol. 3, Issue 3,pp. 01-09, Mar 2013.
[3]. S. Jayaraman, S. Esakkirajan, and T. Veerakumar. “Digital Image Processing”, McGraw-Hill, 2009.
[4]. Cox.I, Miller.M, Bloom.J, Fridrich.J,Kalker. T “Digital Watermarking and Steganography”, 2nd
Edition. ISBN: 978-0123725851
[5]. Wang, R. Z., Lin, C. F., Lin, J. C. “Image hiding by optimal LSB substitution and genetic algorithm ”, Pattern Recognition, vol. 34,
pp.671- 683, 2001.
[6]. Swanson.M.D,Kobayashi. M, Tewfik.A.H. “Multimedia Data-Embedding and watermarking Technologies”,in Proceeding of
IEEE, vol. 86,no.6, pp.1064 – 1087, 1998.
[7]. Mustafa Osman Ali, Elamir Abu Abaida Ali Osman, Rameshwar Row, “Invisible Digital Image Watermarking in Spatial Domain
with Random Localization”, International Journal of Engineering and Innovative Technology (IJEIT),Vol.2, Issue 5, pp.237-
231,Nov 2012.
[8] . Pereira.S , Pun.T, “Robust Template Matching for Affine Resistant Image Watermarks ”, IEEE Transactions on Image Processing,
vol.9,issue.6,pp.1123-1129, 2000.
[9]. Keta Raval, Rajni Bhoomarker, Sameena Zafar “Implementation of Digital Watermarking For Image Security with EBCOT
Algorithm and Error Correcting Codes”,International Journal of Engineering and Advanced Technology (IJEAT), Vol.2, Issue.3,
pp.281-285,Feb 2013.
[10] . A. Chandra,T. Kavitha , “Robust digital watermarking using MDKP”, International Journal of Scientific and Research Publications,
Vol.2, Issue 6, pp.1-4,Jun 2012.
[11]. Ghouti.L, Bouridane.A , Ibrahim MK, “Digital image watermarking using balanced multiwavelets” , IEEE Transactions on Signal
Processing, vol.54,issue.4, pp. 1519-1536,2006.
[12]. Reddy A.A, Chatterji B.N, “A new wavelet based logo watermarking scheme” , Conference Pattern Recognition
letters,vol.26,issue.7, pp. 1019-1027, 2005.
[13]. Shivani Garg, Ranjit Singh, “An Efficient Method for Digital Image Watermarking Based on PN Sequences”, International Journal
on Computer Science and Engineering, Vol. 4 No. 09,pp.1550-1561, Sep 2012.
[14]. Mustafa Osman Ali , Rameshwar Rao “Digital Image Watermarking Basics, and Hardware Implementation”, International Journal
of Modeling and Optimization, Vol. 2, No. 1,pp. 19-24, Feb 2012.
[15]. Prabhishek Singh, R S Chadha “Review to Digital Watermarking and a Novel Approach to Position the Watermark in the Digital
Image”,International Journal of Engineering and Advanced Technology (IJEAT), Vol.2, Issue.4,pp.24-27, Apr 2013.
[16] . Er. Jaspreet Kaur , Er. Karmjeet Kaur, “Digital Watermark: A Study” , International Journal of Advanced Research in Computer
Science and Software Engineering,vol. 2,issue.8, pp. 159-163,Aug 2012.