An effective algorithm for Image security based on Compression and Decomposition method
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 8)Publication Date: 2013-03-25
Authors : Seetaiah Kilaru Yojana Kanukuntla K B S Chary;
Page : 289-294
Keywords : Singular Value Dec omposition; Compression; Image histogram; Correlation coefficient; Structural Similarity Index Measure (SSIM); Similarity index;
Abstract
Security is the main concern in any field. With the frequent attacks, it is a big challenge for the users to protect the digital images which are transmitting over internet. Singular Value D ecomposition (SVD) [7] provides a solution up to a greater extent. This paper mainly concentrates on the invisible watermarking. By using the Wavelets, invisible watermark embed into the original watermark. The main focus concentrated on the wireless commu nications; hence it is important to consider some factors into consideration, they are size of an image and requirements of bandwidth. Keeping in view of all these parameters, compression and transmission should be done. The proposed algorithm uses the SV D method along with compression. The proposed algorithm is robust against all common attacks which exist in image processing field. Tests have been done and results are satisfactory in terms of imperceptibility and security.
Other Latest Articles
- Mechanical usage for Unused Mineral Insulating Oils for Transformers and Switchgear
- PLST: Point Location Using Search Technique Algorithms
- Study on Testing as a Service on Cloud
- New Lightweight Security Protocol for VANET by Using Registration Identity and Group Certificate
- A Robust Technique for Feature-based Image Mosaicing using Image Fusion
Last modified: 2013-04-02 20:07:50