Secure Cloud Resources Using GLCM Based Watermarking Technique
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.8, No. 7)Publication Date: 2019-07-30
Authors : Vaishali; Apneet Kaur;
Page : 146-151
Keywords : Watermarking; DWT; PCA;
Abstract
With the rapid growth of internet the various digital methods has been proposed to protect the multimedia information from the non-authorized accesses use and change. Among all the proposed methods the watermarking technique is the most common technique for protecting the multimedia data for unauthorized access. A novel method is proposed which deals with secure extraction of data by utilizing transfer based image watermarking techniques. The image is embedded with a watermark using a combination of Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) in this scheme. To embed the water mark in the image simply changes the coefficient value of these transforms according to the watermark and the inverse transform is applied to the original image. These methods are too complicated and require more computational power. These methods are also provides more reverts to the security attacks. Another method is GLCM technique.
Other Latest Articles
- EFFECT OF INTERVENTIONS ON REDUCING THE RISK OF THROMBOPHLEBITIS AMONG IV CANNULATED PATIENTS
- EVALUATION OF RADIOMORPHOMETRIC INDICES OF NORMAL AND POSTMENOPAUSAL OSTEOPOROTIC FEMALE PATIENTS BY PANORAMIC RADIOGRAPHS
- INCREASING VOCABULARIES THROUGH JAZZ CHANTS FOR ESL YOUNG LEARNERS
- A DESCRIPTIVE STUDY TO ASSESS THE QUALITY OF LIFE AND COPING STRATEGIES ADOPTED BY PULMONARY TUBERCULOSIS PATIENTS AT SELECTED DOTS CENTERS WITH A VIEW TO DEVELOP A PAMPHLET
- STUDY ON THE EFFECTS OF Β-GLUCAN AND DRIED CHICORY ROOTS EXTRACT SUPPLEMENTATION IN BROILER DIETS ON IMMUNE SYSTEM, GROWTH AND PERFORMANCE PARAMETERS
Last modified: 2019-08-01 21:15:52