Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Using Morphological Transform Domain
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in discovering the edges and also gets the low computational complication. There are two case that twisting the candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding, that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the backward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.
Authors and Affiliations
Nalla Bariki Praveen Kumar
Associated Edge Weight Approach to Improve Personalized Ranking
Abstract: Search engine is most leading and valuable tool that collects the data which is extent and it objectives to offer rising data being reachable to the user. Objective of personalization ranking is to improve the...
Design and Implementation of Binary Neural Network Classification Learning Algorithm
In this paper a Binary Neural Network Learning (BNN-CLA)[1] is analyzed and implemented for solving multi class problem normally the classifier are construct by combining the outputs of several binary ones. The B...
Collective Behavior of social Networking Sites
Now a days a huge data is generated by social media like Facebook, Twitter, Flickr, and YouTube This big data present opportunities and challenges to study collective behavior of data. In this work, we predict collective...
Efficient Fpe Algorithm For Encrypting Credit Card Numbers
The more highly used Internet world contains many sensitive information. Encryption is a process to secure information. An encrypted data requires more storage space for storing. It also needs many changes in q...
Evolution of Sha-176 Algorithm
To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are th...