Filters








2 Hits in 4.6 sec

Image Watermarking Using Two Level Encryption Method Based on Chaotic Logistic Mapping and Rivest Shamir Adleman Algorithm

Tipirneni Venugopal, Rayalaseema University, Vusthikayala Reddy, MallaReddy College of Engineering and Technology
2018 International Journal of Intelligent Engineering and Systems  
In this research study, a multi-purpose image water-marking approach was developed for delivering selfrecovery, ownership verification and tamper localization of the cover image.  ...  Initially, the cover image was converted into wavelet domain by using Integer Wavelet Transform (IWT) and then the logo image was encrypted by using chaotic logistic mapping.  ...  In this research paper, two level DWT was employed on the cover image, and then SVD was applied to every sub-band at second level of DWT.  ... 
doi:10.22266/ijies2018.1231.27 fatcat:mxwpwyxpffhzdfnlpx7sgslbbm

WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II [article]

Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, Modjtaba Rouhani
2020 arXiv   pre-print
Hence, this paper presents an optimized multipurpose blind watermarking in Shearlet domain with the help of smart algorithms including MLP and NSGA-II.  ...  Digital watermarking is a remarkable issue in the field of information security to avoid the misuse of images in multimedia networks.  ...  In [9] , a novel strategy for copyright protection and content validation in the domain of DWT based on SVD and ABC was proposed.  ... 
arXiv:2005.03382v1 fatcat:hsdkqvdmmjhljottt5i7twyrne