An effective algorithm for Image security based on Compression and Decomposition method
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 8)Publication Date: 2013-03-25
Authors : Seetaiah Kilaru Yojana Kanukuntla K B S Chary;
Page : 289-294
Keywords : Singular Value Dec omposition; Compression; Image histogram; Correlation coefficient; Structural Similarity Index Measure (SSIM); Similarity index;
Abstract
Security is the main concern in any field. With the  frequent attacks, it is a big challenge for the users to  protect the digital images which are transmitting  over internet. Singular Value D  ecomposition (SVD)  [7] provides a solution up to a greater extent. This  paper mainly concentrates on the invisible  watermarking. By using the Wavelets, invisible  watermark embed into the original watermark. The  main focus concentrated on the wireless  commu  nications; hence it is important to consider  some factors into consideration, they are size of an  image and requirements of bandwidth. Keeping in  view of all these parameters, compression and  transmission should be done. The proposed  algorithm uses the SV  D method along with  compression. The proposed algorithm is robust  against all common attacks which exist in image  processing field. Tests have been done and results  are satisfactory in terms of imperceptibility and  security.
Other Latest Articles
- Mechanical usage for Unused Mineral Insulating Oils for Transformers and Switchgear
- PLST: Point Location Using Search Technique Algorithms
- Study on Testing as a Service on Cloud
- New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate
- A Robust Technique for Feature-based Image Mosaicing using Image Fusion
Last modified: 2013-04-02 20:07:50
 Share Your Research, Maximize Your Social Impacts
                    Share Your Research, Maximize Your Social Impacts
                

