List of Journals    /    Call For Papers    /    Subscriptions    /    Login
 
 
 
 
 SEARCH
By Author By Title
 
 
ABOUT CSC
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
 Special Issue CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR EDITORIAL
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 CSC LIBRARY
 Browse CSC Library
 Open Access Policy
  SERVICES
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 SUBSCRIPTIONS
 Subscriptions
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Librarians
 Subscriptions Agents
 Order Form
 DOWNLOADS
 
 
 
 
Performance Analysis of Spatial and Frequency Domain Multiple Data Embedding Techniques towards Geometric Attacks
Full text
 PDF(1.27MB)
Source 
International Journal of Security (IJS)
Table of Contents
Download Complete Issue    PDF(1.42MB)
Volume:  4    Issue:  3
Pages:  28-37
Publication Date:   July 2010
ISSN (Online): 1985-2320
Pages 
28 - 37
Author(s)  
J.Samuel Manoharan - India
Kezi C.Vijila - India
A.Sathesh - India
 
Published Date   
10-08-2010 
Publisher 
CSC Journals, Kuala Lumpur, Malaysia
ADDITIONAL INFORMATION
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
 
KEYWORDS:   Luminance, DCT, DWT, Correlation , Coefficient 
 
 
This Manuscript is indexed in the following databases/websites:-
1. PDFCAST
2. Docstoc
3. Scribd
4. Directory of Open Access Journals (DOAJ)
5. Google Scholar
6. WorldCat
7. Academic Index
8. Bielefeld Academic Search Engine (BASE)
9. refSeek
10. Socol@r
11. iSEEK
 
 
Data hiding is an age-old technique used to hide data in an image. Several attacks are prevalent to hack the data hidden inside the image. Considerable researches are going on in this area to protect the hidden data from unauthorized access. The current work is focused towards studying the behavior of Spatial and Frequency Domain Multiple data embedding techniques towards noise prone channels enabling the user to select an optimal embedding technique. The Performance of the above techniques is also focused towards multiple embedded data inside a single cover image. The robustness of the watermark is tested by incorporating several attacks and testing the watermark strength.  
 
 
 
1 Y. Wang, J. F. Doherty and R. E. Van Dyck, “A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images”, IEEE Transactions on Image Processing, Vol. 11, Issue 2, pp. 77-88, 2002
2 Chun Shien Lu, H.Y.M.Liao, “Multipurpose watermarking for image authentication and protection”, IEEE Transactions on Image Processing., Vol.10, Issue 10, pp.1579-1592, 2001.
3 V. Licks and R. Jordan, “On Digital Image Watermarking Robust to Geometric Transformations,” Proceedings of 2000 International Conference Image Processing (ICIP 2000), Vol. 3, pp. 690-693, 2000.
4 ]. Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton, “Spatial domain Digital Watermarking of Multimedia Object for Buyer Authentication”, IEEE Transactions on Multimedia, Volume 6, No.1, pp. 1- 15, 2004
5 Jamal Hussein, “Spatial domain Watermarking scheme for color images based on log average luminance”, Int’l Journal of Computing, Volume 2, Issue 1, 2010
6 Nikolaidis, Pitas, “Robust Image Watermarking the Spatial Domain”, International Journal of Signal Processing”, Vol.66, Issue 3, pp. 385 – 403, 1998.
7 Verma P, D.P. Agarwal, Jain S, “Spatial Domain Robust Blind Watermarking for Color Image”, Asian Journal of Information Technology, Vol. 6, Issue. 4, pp. 430 – 435, 2007.
8 Wu, D. C., Tsai, W. H., “Spatial-Domain Image Hiding Using an Image Differencing”, IEEE Proceedings -Vision, Image and Signal Processing, Vol. 147, Issue. 1, pp. 29 – 37, 2000.
9 Juan Hernandez, Martin Amado, Fernando Perez, “DCT Domain Watermarking Techniques for Still Images: Detector Performance analysis and new structure”, IEEE Transactions on Image Processing, Vol. 9, No.1, pp. 55 – 68, 2000.
10 Saraju P.Mohanty, K. R. Ramakrishnan and Mohan S. Kankanhalli, “A DCT Domain Visible Watermarking Technique for Images” by ICME, vol.2 , pp. 1029 - 1032, 2000
11 Mauro Barni. Franco Bartolini, Vito Cappellini, Alessandro Piva., “A DCT domain system for robust image watermarking”, International Conference on Signal Processing, Vol.66, Issue.3, pp. 357-372, 1998.
12 A.Lumini, D.Maio, “A Wavelet Based Image watermarking scheme”, The International Conference on Information Technology: Coding and Computing (ITCC), pp. 122-127, 2000
13 Ali Al-Haj, “Combined DWT – DCT Digital Image Watermarking”, Journal of Computer Science, Vol.3, Issue.9, pp.740-746, 2007.
14 Sathesh, Samuel Manoharan, “A Dual Tree Complex Wavelet Transform Construction and its application to Image Denoising, International Journal of Image Processing, Vol.3, Issue.6, pp.293 – 300,2010.
 
 
 
 
 
 
 
 
J.Samuel Manoharan : Colleagues
Kezi C.Vijila : Colleagues
A.Sathesh : Colleagues  
 
 
 
  Untitled Document
 
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
 
  
 
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.