An improved contourlet transform technique for image watermarking
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
In this paper, contourlet transform technique is explored to hide the information confidentially from the unauthorized users. The image is decomposed into subbands by using contourlet transform. These subbands are useful for watermark is embedded into the contourlet coefficients. These subbands contain directionality as well as anisotropy. Watermarked image is generated as the combination of watermark image is product with the same size of pseudo random data with a constant and highest frequency subband of original image. The number of attacks such as JPEG, median filter, gaussian filters, rotation, cropping, and salt & peppers are tested. Watermark image has extracted from the watermarked image with the help of inverse contourlet transform. Experiment results for proposed method gives better PSNR value compared to the existing methods.
Authors and Affiliations
Y. Anusha, K. Veeraswamy
Merits and Demerits of Open Source Software
Open source software (OSS) is one of the fastest growing movements towards the less budget and cheaper software. Within the technical development of the world, yet we have seen that OSS will become a viable alternati...
Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with i...
Improved Diversity with Limited Feed back for more than two users
We consider interference cancellation for a system with more than two users when users know each other channels. The goal is to utilize multiple antennas to cancel the interference without sacrificing the diversity or...
A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference
Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...
Design and Development of Mobile Assisted Language Learning (MALL) application for English Language using Android Push Notification Services
The pervasive nature of the mobile devices and the wide array of mobile learning applications enables the acceptance of mobile devices as an indispensable component in the current pedagogical learner-centric mode of...