5 research outputs found

    Steganography- A Powerful Web Security Tool for Data Transmission

    Get PDF
    The main objective of this paper titled � Steganography � A secured tool for web data transmission� is to provide security for data files during transmission in the network. The main motto of this type of data security is to prevent data access by unauthorized users during data transmission. The steganography is the process to convert the transmitting data in the network in an unreadable format and it is difficult to understand the stolen person

    EFFECTIVE ROBUST PATCHWORK METHOD TO THE VULNERABLE ATTACK FOR DIGITAL AUDIO WATERMARKING

    Get PDF
    This paper presents patchwork based digital audio watermarking. The advanced growth in transmission of digital data has resulted in a corresponding elevation in the need for copyright protection of signal. Cryptography and steganography are used for the content protection but do not completely solve the copyright issue. Watermarking is a method to protect and identify the digital data while maintaining the quality of the host media, it permits various types of watermarks to be hidden in audio signal e.g. image, audio and video. This paper limits on image embedding technique using patchwork-based method. In patchwork based method average of all segments of approximate coefficients is calculated for embedding watermark into sound signal. The experimental results shows that proposed method achieves imperceptibility for audio signal as watermarked audio signal is inaudible after embedding watermark and robustness of watermark against different signal processing attacks with higher PSNR. The resulting audio is robust to attacks and exhibits good quality in term of peak signal to noise ratio. The simulation results show the effectiveness of the proposed system

    Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining

    Get PDF
    The privacy is a major concern in big data mining approach. In this paper, we propose a novel self-recovery speech watermarking framework with consideration of trustable communication in big data mining. In the framework, the watermark is the compressed version of the original speech. The watermark is embedded into the least significant bit (LSB) layers. At the receiver end, the watermark is used to detect the tampered area and recover the tampered speech. To fit the complexity of the scenes in big data infrastructures, the LSB is treated as a parameter. This work discusses the relationship between LSB and other parameters in terms of explicit mathematical formulations. Once the LSB layer has been chosen, the best choices of other parameters are then deduced using the exclusive method. Additionally, we observed that six LSB layers are the limit for watermark embedding when the total bit layers equaled sixteen. Experimental results indicated that when the LSB layers changed from six to three, the imperceptibility of watermark increased, while the quality of the recovered signal decreased accordingly. This result was a trade-off and different LSB layers should be chosen according to different application conditions in big data infrastructures

    Robust digital image watermarking

    Full text link
    This research presents a novel rank based image watermarking method and improved moment based and histogram based image watermarking methods. A high-frequency component modification step is also proposed to compensate the side effect of commonly used Gaussian pre-filtering. The proposed methods outperform the latest image watermarking methods
    corecore