Defended Data Embedding For Chiseler Avoidance in Visible  Cryptography by Using Morphological Transform Domain

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2

Abstract

 This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate  images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we  propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind  watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the  block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in  discovering the edges and also gets the low computational complication. There are two case that twisting the  candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding,  that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A  contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the backward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present  pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.

Authors and Affiliations

Nalla Bariki Praveen Kumar

Keywords

Related Articles

Associated Edge Weight Approach to Improve Personalized Ranking

Abstract: Search engine is most leading and valuable tool that collects the data which is extent and it objectives to offer rising data being reachable to the user. Objective of personalization ranking is to improve the...

 Design and Implementation of Binary Neural Network Classification Learning Algorithm

 In this paper a Binary Neural Network Learning (BNN-CLA)[1] is analyzed and implemented for solving multi class problem normally the classifier are construct by combining the outputs of several binary ones. The B...

Collective Behavior of social Networking Sites

Now a days a huge data is generated by social media like Facebook, Twitter, Flickr, and YouTube This big data present opportunities and challenges to study collective behavior of data. In this work, we predict collective...

 Efficient Fpe Algorithm For Encrypting Credit Card Numbers

 The more highly used Internet world contains many sensitive information. Encryption is a process to secure information. An encrypted data requires more storage space for storing. It also needs many changes in q...

 Evolution of Sha-176 Algorithm

 To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are th...

Download PDF file
  • EP ID EP110087
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Nalla Bariki Praveen Kumar (2013).  Defended Data Embedding For Chiseler Avoidance in Visible  Cryptography by Using Morphological Transform Domain. IOSR Journals (IOSR Journal of Computer Engineering), 15(2), 17-21. https://europub.co.uk./articles/-A-110087