scholarly journals The steganographic video analysis uses combination of discrete cosine transform and discrete wavelet transform algorithms

2018 ◽  
Vol 1116 ◽  
pp. 022046
Author(s):  
B A Wijaya ◽  
M K M Nasution ◽  
E M Zamzami
2013 ◽  
Vol 002 (001) ◽  
pp. 25-27 ◽  
Author(s):  
Anurag Tiwari ◽  
◽  
Payal Chandrakant ◽  
Trip ti ◽  
Surabhi Chaudhary ◽  
...  

Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Yohan Varghese ◽  
Vardan Agarwal

: Watermarking is a process of embedding a message inside a digital signal like an image, video or text. It is used for several key reasons such as authenticity verification, ownership recognition and hidden communication. In this paper, we discuss about image watermarking, where secret messages are stored in images. Introduction: We propose a dual watermarking approach, which is based on Discrete Cosine Transform, Discrete Wavelet Transform and Singular Value Decomposition methods. This paper considers one watermark as robust and other water mark as fragile. Method: The robust watermark is embedded in Discrete Wavelet Transform- Singular Value Decomposition - domain and is used to transmit hidden messages. The fragile watermark is embedded in Discrete Cosine Transform domain and is used for verification of secret message of the robust watermark. The proposed algorithm is tested in the experimental results section and shows promising results against denoising, rotation, translation and cropping attacks. Result: The results show that the performance of the proposed algorithm in terms of mean squared error, structural similarity and peak signal to noise ratio is S4considerable as compared with the existing methods. Discussion: We present the comparison results with Himanshu et. al. in table 10, from which we can see that our method performs better with gaussian noise and rotational attack only lacking with Salt and Pepper noise. Fig. 7 and Fig. 8, in terms of resulting PSNR shows the variation of noise variance and degree of rotation. From the graphs it is evident that out method performs better against Gaussian and rotational attack. Conclusion: In this paper a dual watermarking method is proposed in which one watermark is fragile which is called as authentication watermark whereas the other watermark is robust and is called as the information watermark. The authentication watermark is embedded in the fractional part of DCT domain in the cover image and the information watermark is embedded in the diagonal vector of the LL sub-band.


2015 ◽  
Vol 83 (4) ◽  
pp. 3133-3155 ◽  
Author(s):  
Faisal S. Al-Kamal ◽  
Emad S. Hassan ◽  
Mohammed Abd El-Naby ◽  
Farid Shawki ◽  
Said E. El-Khamy ◽  
...  

2012 ◽  
Vol 198-199 ◽  
pp. 244-248 ◽  
Author(s):  
Ling Tang ◽  
Ming Ju Chen ◽  
Hong Song

In this research we undertake a study of image compression based on the discrete cosine transform(DCT) and discrete wavelet transform(DWT). Then a hybrid color image compression algorithm based on DCT and DWT is proposed. This algorithm is implemented through transform the color image using DWT in the YCbCr space first, and then DCT in the low frequency, adopt huffman coding, RLE and arithmetic coding in the encoded mode. In experiments, the results outperform the only DCT and the only DWT typically higher in peak signal-to-noise ratio and have better visual quality.


2019 ◽  
Vol 8 (4) ◽  
pp. 4034-4038

Counterfeit notes are one of the major issue in money transactions. In a growing country like India, it is becoming big problem for the economy. As the advances in printing and scanning technologies are developing, it is very easy for any person to print counterfeit notes with use of latest hardware machines. Identifying counterfeit notes in manual way takes a lot of time and manpower. Hence there is requirement of automation technique using which the counterfeit currency recognition process can be done effectively. Many methods have been proposed and implemented with MATLAB. By using Discrete cosine transform (DCT) algorithm blocks of the image are represented by coefficients of DCT. So, due to the presence of blocking articrafts in DCT, it is a drawback for this method. Hence, We have implemented a counterfeit note detection unit with a different algorithm which uses discrete wavelet transform (DWT) in MATLAB. This paper is another attempt on the same project to give a better solution for counterfeit currency problem.


Sign in / Sign up

Export Citation Format

Share Document