ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Cloud Resources Using GLCM Based Watermarking Technique

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 7)

Publication Date:

Authors : ; ;

Page : 146-151

Keywords : Watermarking; DWT; PCA;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

With the rapid growth of internet the various digital methods has been proposed to protect the multimedia information from the non-authorized accesses use and change. Among all the proposed methods the watermarking technique is the most common technique for protecting the multimedia data for unauthorized access. A novel method is proposed which deals with secure extraction of data by utilizing transfer based image watermarking techniques. The image is embedded with a watermark using a combination of Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) in this scheme. To embed the water mark in the image simply changes the coefficient value of these transforms according to the watermark and the inverse transform is applied to the original image. These methods are too complicated and require more computational power. These methods are also provides more reverts to the security attacks. Another method is GLCM technique.

Last modified: 2019-08-01 21:15:52