The Comparative Study of DCT and DWT in Blind Detection Based Digital Watermarking
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Digital Watermarking is one of the data hiding technique, has been popular in today for providing copyright protection. Fundamentally, to implement a digital watermarking, there are two approaches, pixel modification based and frequency domain based. In frequency domain based watermarking techniques, DCT and DWT are commonly used and popular today. The purpose of this paper is to compare and represent watermarking performance with the same technique, the two techniques; DCT and DWT are presented with new approach. At first, the new approach watermarking technique is discussed and proposed. In the technique, on-line handwritten signature is acquired from G-Pen F350 tablet, which is used as watermark. Watermark is embedded in mid-band DCT domain. On the other hand, LH band of DWT is used as embedded media.Finally with the help of experimental results, several performance analyses over the robustness of watermark against various attacks of each technique are compared to determine which technique is better
Authors and Affiliations
Mya Thidar Kyaw , Dr. Kyi Soe
Performance Comparison of ACO Algorithms for MANETs
Mobile Ad Hoc Network (MANET) is a dynamic multichip wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the...
Dynamic Load Balancing in Cloud Using Live Migration of Virtual Machine
DISTRIBUTED GENERATION- A NEW APPROACH
— Indian power sector and power distribution utilities are going through a reformation process to cope up with the regulatory change for reduction in AT & C Loss, improvement in Power Quality, Reliability of Po...
Improvement of the SARA strategies for MANET model
Wireless ad-hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Routing is difficult in MANET’s since mobility may cause radio links to break frequently. When any...
Accurate Spam Mail Detection using Bayesian Algorithm
— With the increasing popularity of a E-mail users, E-mail spam problem growing proportionally. Spam filtering with near duplicate matching scheme is widely discussed in recent years. It is based on a known spam...