ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An effective algorithm for Image security based on Compression and Decomposition method

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 8)

Publication Date:

Authors : ;

Page : 289-294

Keywords : Singular Value Dec omposition; Compression; Image histogram; Correlation coefficient; Structural Similarity Index Measure (SSIM); Similarity index;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Security is the main concern in any field. With the frequent attacks, it is a big challenge for the users to protect the digital images which are transmitting over internet. Singular Value D ecomposition (SVD) [7] provides a solution up to a greater extent. This paper mainly concentrates on the invisible watermarking. By using the Wavelets, invisible watermark embed into the original watermark. The main focus concentrated on the wireless commu nications; hence it is important to consider some factors into consideration, they are size of an image and requirements of bandwidth. Keeping in view of all these parameters, compression and transmission should be done. The proposed algorithm uses the SV D method along with compression. The proposed algorithm is robust against all common attacks which exist in image processing field. Tests have been done and results are satisfactory in terms of imperceptibility and security.

Last modified: 2013-04-02 20:07:50