[PDF][PDF] Image watermarking using 3-level discrete wavelet transform (DWT)
N Kashyap, GR Sinha - International Journal of Modern Education …, 2012 - researchgate.net
We have implemented a robust image watermarking technique for the copyright protection
based on 3-level discrete wavelet transform (DWT). In this technique a multi-bit watermark is …
based on 3-level discrete wavelet transform (DWT). In this technique a multi-bit watermark is …
Steganography algorithm to hide secret message inside an image
R Ibrahim, TS Kuan - arxiv preprint arxiv:1112.2809, 2011 - arxiv.org
In this paper, the authors propose a new algorithm to hide data inside image using
steganography technique. The proposed algorithm uses binary codes and pixels inside an …
steganography technique. The proposed algorithm uses binary codes and pixels inside an …
A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
In this paper, we introduce a new digital watermarking algorithm using least significant bit
(LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB …
(LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB …
[PDF][PDF] Data hiding by using AES Algorithm
R Mohamad - Wasit Journal of Computer and Mathematics Science, 2022 - iasj.net
Data hiding is the art of hiding data for various purposes such as; to maintain private data,
secure confidential data and so on. Securely exchange the data over the internet network is …
secure confidential data and so on. Securely exchange the data over the internet network is …
[PDF][PDF] 3-level DWT Image watermarking against frequency and geometrical attacks
A Ahmad, GR Sinha, N Kashyap - International Journal of …, 2014 - researchgate.net
This paper introduces a robust image watermarking technique for the copyright protection.
The proposed method is based on 3-level discrete wavelet transform (DWT). Encoded secret …
The proposed method is based on 3-level discrete wavelet transform (DWT). Encoded secret …
[PDF][PDF] Digital image watermarking based on joint (DCT-DWT) and Arnold Transform
MFM El Bireki, MFL Abdullah… - … Journal of Security …, 2016 - researchgate.net
The researcher has adopted a digital watermarking technique which operates in the
frequency domain: a hybrid watermarking scheme based joint discrete wavelet transform …
frequency domain: a hybrid watermarking scheme based joint discrete wavelet transform …
[PDF][PDF] Image steganography technique by using Braille method of blind people (LSBraille)
AA Ali, AHS Saad - Int. J. Image Process, 2013 - Citeseer
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message, a form …
apart from the sender and intended recipient, suspects the existence of the message, a form …
[PDF][PDF] Mobisis: An android-based application for sending stego image through mms
R Ibrahim, LC Kee - ICCGI 2012: The Seventh International Multi …, 2012 - personales.upv.es
A Steganography algorithm is used to hide data from third party in such a way that people
are unable to detect the existence of the hidden message inside the stego image. This …
are unable to detect the existence of the hidden message inside the stego image. This …
[PDF][PDF] Digital image watermarking techniques: A survey
M Singh, A Singhal, A Chaudhary - International journal of computer …, 2013 - ijcst.org
Due to the recent progress in internet technology and evolution of very high speed networks
operating everywhere, protection of digital content is must. So, it has become a tough task to …
operating everywhere, protection of digital content is must. So, it has become a tough task to …
Augmented Data Protection: Fortifying Confidentiality through CBBPH approach
AJ Tripathy, U Tiwari, S Anirudh… - 2024 15th …, 2024 - ieeexplore.ieee.org
The foundation of contemporary data security, guaranteeing integrity and confidentiality in
digital communications, is referred to as cryptography. On the other side, image …
digital communications, is referred to as cryptography. On the other side, image …