4,382 Hits in 4.3 sec

Fusion Framework for Robust and Secured Watermarking

Nisha Sharma, Anjali Goyal, Y.S Brar
2014 International Journal of Computer Applications  
To introduce the secure watermarking, watermark is secured using Arnold Transformation and embedded in the cover image.  ...  This paper presents a robust and secure watermarking technique for digital image. To implement the technique, Discrete Wavelet Transform (DWT) is applied on cover image.  ...  -Pitas I and Kaskalis T. H. , 1995 Index Terms Computer Science Security ;Applying signatures on digital images.  ... 
doi:10.5120/17762-8873 fatcat:aw7splgd7feobhzj2q7ru3hkba

New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health

Mohamed Boussif
2017 International Journal of Electrical and Computer Engineering (IJECE)  
The purpose of the combination of these three proposed algorithms (encryption, robust hiding and fragile watermarking) is the full protection of medical imaging, its information and its report in terms  ...  Then, we use a fragile LSB watermarking for hide, in spatial domain, the kw key and the entropy of imaging in itself for integrity check in encrypted domain.  ...  PROPOSED WATERMARKING/ENCRYPTION SYSTEM In this section, we present the proposed security system for medical images.  ... 
doi:10.11591/ijece.v7i6.pp3385-3394 fatcat:ycznqgjthvcj5e5z5ublw7txve

Robust, Secure and High Capacity Watermarking Technique based on Image Partitioning-Merging Scheme

Baisa L. Gunjal
2016 International Journal of Information Technology and Computer Science  
The technique is non-blind and tested with grey scale cover images of size 512x512 and watermark images of size 512x512.  ...  This paper presents secure and high capacity watermarking technique using novel approach of Image Partitioning-Merging Scheme (IPMS).  ...  They are less secured and support low payload hiding capacity, less perceptual quality of watermarked image and provide less correlation between embedded and extracted watermark.  ... 
doi:10.5815/ijitcs.2016.04.09 fatcat:nuwqp7qihrhchcqahrk4pf7cue

Secure Audio Watermarking based on Haar Wavelet and Discrete Cosine Transform

Varun Mehta, Neha Sharma
2015 International Journal of Computer Applications  
In this paper, a secure way of Audio-Watermarking is implemented using Discrete Wavelet Transform (Haar Wavelet) and Discrete Cosine Transform.  ...  And, techniques like steganography, watermarking and cryptography help us to do so.  ...  And security of data is an issue. Though it can be achieved by cryptography, steganography or watermarking.  ... 
doi:10.5120/ijca2015905599 fatcat:vduse65sirh4voutdgfmuuyoz4

Medical Images Watermarking For Security In M-Health: Implementation On Smartphone Android Os

Mohamed Boussif, Noureddine Aloui, Adnene Cherif
2018 Zenodo  
Therefore, in this paper, a new security system for medical imaging dedicated for m-Health is presented which is based on the high capacity robust/fragile blind watermarking of audio report in medical  ...  The objective of the paper is to concept a high capacity watermarking method which can store all audio report size. with an imperceptible watermark and an acceptable watermarked imaging quality and the  ...  Acknowledgment We are grateful to the reviewers for their valuable comments that helped us to improve the quality of the paper.  ... 
doi:10.5281/zenodo.1227655 fatcat:6lqf5cyygrg3fjvciv5kbhev7e

StegoWall: blind statistical detection of hidden data

Sviatoslav V. Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun, Edward J. Delp III, Ping W. Wong
2002 Security and Watermarking of Multimedia Contents IV  
The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and Internet/Network security.  ...  Novel functional possibilities, provided by recent data hiding technologies, carry out the danger of uncontrolled (unauthorized) and unlimited information exchange that might be used by people with unfriendly  ...  INTRODUCTION New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications.  ... 
doi:10.1117/12.465324 dblp:conf/sswmc/VoloshynovskiyH02 fatcat:6o2jvywucnhsrglikw4eez5m6q

Reversible Data Hiding Based on DNA Computing

Bin Wang, Yingjie Xie, Shihua Zhou, Changjun Zhou, Xuedong Zheng
2017 Computational Intelligence and Neuroscience  
In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed.  ...  Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security.  ...  Because of their features of parallelism, high-capacity storage, and low energy consumption, DNA computing is used into many fields, such as image encryption, information security, and other applications  ... 
doi:10.1155/2017/7276084 pmid:28280504 pmcid:PMC5320385 fatcat:ymk2inbv4vgebjemf5fcydoi7e

The use of computational intelligence in digital watermarking: Review, challenges, and new trends

Darwish, A. Abraham
2011 Neural Network World  
Information hiding systems hide secret information into an object, e.g., an audio, video, image, or written text, to create a watermarked object.  ...  Darwish et al. [6] presented a securing patient medical images and authentica- tion system to increase the security, confidentiality and integrity of medical images which is transmitted through the Internet  ... 
doi:10.14311/nnw.2011.21.017 fatcat:bygr6l7srzhijduwlh2or4zekm

Printed Document Watermarking Using Phase Modulation

Chabukswar Hrishikesh, S. Shefali
2009 2009 Second International Conference on Emerging Trends in Engineering & Technology  
Thus, with such a "lock and key" approach, it greatly improves the security level of the optical watermark.  ...  An optical watermark is a two-dimensional binary image. It can be of any shape and can be printed on any part of a document. The hidden information is embedded using phase modulation.  ...  Coordinate Mapping of the Basic Watermark Layer The basic dot array and hiding image is as shown below The binary image is embedded in dot array by phase modulation so that we get watermark layer.  ... 
doi:10.1109/icetet.2009.183 dblp:conf/icetet/HrishikeshS09 fatcat:nm3nphvekrfmffc5v27htohhhe

Additional articles of special issue on Real-time image watermarking and forensics in cloud computing

Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang
2019 Journal of Real-Time Image Processing  
for robust image watermarking, which simplifies the DCT/IDCT algorithms and only involves the addition and shift operations instead of the complex multiplication/division and nonlinear function.  ...  Experimental results show that the proposed accelerator has good efficiency and excellent performance achieving robust image watermarking.  ...  accelerator for robust image watermarking, which simplifies the DCT/IDCT algorithms and only involves the addition and shift operations instead of the complex multiplication/division and nonlinear function  ... 
doi:10.1007/s11554-019-00897-4 fatcat:7lffibsjsbarxivbbmuccqqkju

Audio Steganography to Protect the Confidential Information: A Survey

Elham Zinaly, Avaz Naghipour
2017 International Journal of Computer Applications  
Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it.  ...  For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function.  ...  to the hidden data and the tissue of image It is not visible at majority of image structures Cost With low computational cost With high computational cost Table 3 . 3 Comparison of audio steganography  ... 
doi:10.5120/ijca2017914561 fatcat:2ak4cvgbezdynmy7ktds52uklq

Secured Data Hiding based on Compression Function and Quantization

Ajit Danti, G. R. Manjula
2012 International Journal of Applied Information Systems  
The scalar and the vector methods along with a secret key for data hiding will make the method more secure and efficient. The experimental results demonstrate the robustness of the proposed approach.  ...  In this paper, Quantization Index Modulation and the compression function of µ-Law standards for quantization are used.  ...  The authors would like to thank the Management, Principal and Staff of JNNCE Shimoga for their support.  ... 
doi:10.5120/ijais12-450109 fatcat:guwgd7svdrgoneyyezsxzxol6i

Hiding Secret Data Using Image Steganography

Paridhi Tutlani, Mrs. Priyanka
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper.  ...  In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators.  ...  RESULTS AND DISCUSSION Embedding a picture watermark Here is the full code of the DrawImage (Image) system, which makes all control of the image, and later will show the code for other details.  ... 
doi:10.32628/cseit119548 fatcat:gz57uioi3rdv7bvvzjp6blijba

Enhanced Framework for Ensuring Privacy Preserving Image Retrieval in Cloud

Data hiding and ECC (Elliptic curve cryptosystem) based watermarking technique at cloud computing platform.  ...  Once data is uploaded to cloud-platform, the privacy and security of image-data fully depend and believe upon cloud service provider honesty.  ...  Data hiding and ECC based watermarking technique at cloud computing platform with reduced time.  ... 
doi:10.35940/ijitee.l3304.1081219 fatcat:fo6wz4za6zhn5fzayvlnf3v4yq

Genetic algorithms for optimality of data hiding in digital images

Santi P. Maity, Malay K. Kundu
2008 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
This paper investigates the scope of usage of Genetic Algorithms (GA) for data hiding in digital images.  ...  Two spatial domain data hiding methods are proposed where GA is used separately for (i) improvement in detection and (ii) optimal imperceptibility of hidden data in digital images respectively.  ...  The stego image is shown in Fig. 2(a) and PSNR value for the watermarked image is 39.33 dB. The security of the hidden data is 0.00124.  ... 
doi:10.1007/s00500-008-0329-5 fatcat:bjncaut5wrahlprr7llg5qo3ka
« Previous Showing results 1 — 15 out of 4,382 results