Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2
Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2
Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4
PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3
Is Internet becoming a Major Contributor for Global warming - The Online Carbon Footprint
Volume-2 | Issue-4
Augmented Reality in Education
Volume-2 | Issue-4
A Study on Various Task-Work Allocation Algorithms in Swarm Robotics
Volume-2 | Issue-2
IoT based Biotelemetry for Smart Health Care Monitoring System
Volume-2 | Issue-3
Tungsten DiSulphide FBG Sensor for Temperature Monitoring in Float Glass Manufacturing
Volume-2 | Issue-4
GUI based Industrial Monitoring and Control System
Volume-3 | Issue-2
AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1
Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4
Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2
Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2
VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1
Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3
Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3
PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3
Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3
Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2
Volume - 3 | Issue - 3 | september 2021
Published
08 November, 2021
Multimedia data in various forms is now readily available because of the widespread usage of Internet technology. Unauthorized individuals abuse multimedia material, for which they should not have access to, by disseminating it over several web pages, to defraud the original copyright owners. Numerous patient records have been compromised during the surge in COVID-19 incidents. Adding a watermark to any medical or defense documents is recommended since it protects the integrity of the information. This proposed work is recognized as a new unique method since an innovative technique is being implemented. The resilience of the watermarked picture is quite crucial in the context of steganography. As a result, the emphasis of this research study is on the resilience of watermarked picture methods. Moreover, the two-stage authentication for watermarking is built with key generation in the section on robust improvement. The Fast Fourier transform (FFT) is used in the entire execution process of the suggested framework in order to make computing more straightforward. With the Singular Value Decomposition (SVD) accumulation of processes, the overall suggested architecture becomes more resilient and efficient. A numerous quality metrics are utilized to find out how well the created technique is performing in terms of evaluation. In addition, several signal processing attacks are used to assess the effectiveness of the watermarking strategy.
KeywordsDigital watermarking Fast Fourier Transform robust security copyright protection singular value decomposition
Full Article PDF Download Article PDF