ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Electrical Engineering and Technology (IJEET) (Vol.11, No. 3)

Publication Date:

Authors : ;

Page : 164-172

Keywords : Watermarking Technology; DCT; Arnold transform; chaotic encryption; IDCT.;

Source : Downloadexternal Find it from : Google Scholarexternal


The study says that the double security layer with image encryption and decryption technique is used for watermarking the important details or images being hacked or theft. Initially in order to improve the security and invisibility of the robust watermarked image the adaptive based watermarking algorithm is used which uses chaos security layer. But this layer can be hacked or broken easily due to lack of blocks in it. In order to overcome that the Discrete cosine transform (DCT) is used will be used for encrypting the robust image with the Arnold transform and Chaos encryption for the security level. The input image will be divided into non overlapping 8*8 blocks and then the DCT will be applied for encrypting the secured image in an watermarked manner. Then the Arnold based double layer security using chaotic encryption will be done to secure the data with key. The Inverse Discrete cosine transform (IDCT) will be used to decrypt the secured image from the security layer with help of key. This technique show more efficiency with robustness in the image with high security system. It will be used in the health care application to hide the details of the patient and also in the e commerce system with high security process.

Last modified: 2021-03-03 17:38:53