alexa INFORMATION HIDING WATERMARKING DETECTION TECHNIQUE BY
ISSN: 1948-1432

Journal of Global Research in Computer Sciences
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

INFORMATION HIDING WATERMARKING DETECTION TECHNIQUE BY PSNR AND RGB INTENSITY

Ms. Neha Chauhan*1, Akhilesh A. Waoo2 and P. S. Patheja3
  1. Designation: Student, M. Tech, Organization: BIST, Bhopal, India,
  2. Designation: Assistant Professor, Organization: BIST, Bhopal, India,
  3. Designation: HOD, Organization: BIST, Bhopal, India,
Corresponding Author: Ms. Neha Chauhan, E-mail: [email protected]
Related article at Pubmed, Scholar Google
 

Abstract

There has been many techniques for hiding messages in images. We propose a new region-adaptive watermarking algorithm which will be used for the novel application to detect watermark attacks. One of the major advantages of the proposed watermarking detection technique is PSNR and RGB Intensity value that it allows tamper detection using linear classifier by providing these discriminating features. The watermark data is embedded on different regions of the host image using a combination of discrete wavelet transform and singular value decomposition technique. In addition, there is a novel use the region-adaptive watermarking technique as a means to detect if certain types of attack have occurred. As will be elaborated, the technique to improves the speed of detection, and also test the robustness of the proposed watermarking scheme. They are Gaussian noise, salt and pepper noise, sharpen, smoothing, histogram equalization and JPEG compression attack. At the same time, rotation, translation and scaling belongs to geometric attacks are also applied. The severity of these attacks can be adjusted by modifying their corresponding parameter values. Experimental results will detected the hiding data on the original image and has little relation to secret message file. It helps, for providing more security to the information

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords