A Layered Approach for Watermarking In Images Based On Huffman Coding
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 2
Abstract
With the rapid increase of the internet users and the bandwidth is appreciable but at the same also brought some problems beside its advantages. The great facility in copying a digital content rapidly, perfectly and without limitations on the number of copies has resulted the problem of copyright protection. The ease with which duplication of digital information can be done has raised the need for us to take care of copyright and copyright protection mechanisms. One way to protect digital data against illegal recording or retransmission is to embed a signal, amount of data called a digital signature or copyright label or watermark that completely provides with the authentication or ownership of the user. In this work we propose a new algorithm through which we can embed more data than the regular methods under spatial domain. We compress the secret data using Huffman coding and then this compressed data is embedded using modified auxiliary carry watermark method. In this method our main contribution is towards increasing the amount of information which is to be embedded and at the same time increasing the security of the algorithm also.
Authors and Affiliations
D. Lalitha Bhaskari , P. S. Avadhani , M. Viswanath
FEATURE SELECTION METHODS AND ALGORITHMS
Feature selection is an important topic in data mining, especially for high dimensional datasets. Feature selection (also known as subset selection) is a process commonly used in machine learning, wherein subsets of the...
Clustering of Sedimentary Basins Using Associative Neural memories (ART2)
Associative Memory (AM) research covers technologies enabling implementation of associative memory which enables thought process and links previous experience to novel situations. Each neural network system requires a me...
Revisions & Altercations in the Administration of Assets for Mobile Grid Computing
This paper provides a discussion on the Mobile Grid concept, the revisions that this implies in the Grid technology and the altercations that have to be met in order to address the new computing paradigm, mainly focused...
Survey of Attacks on Mobile AdhocWireless Networks
Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the c...
Improved Hybrid Clustering and Distance-based Technique for Outlier Removal
Outliers detection is a task that finds objects that are dissimilar or inconsistent with respect to the remaining data. It has many uses in applications like fraud detection, network intrusion detection and clinical diag...