12 research outputs found

    Digital Watermarking: Digital Data Hiding techniques for BMP Images

    Get PDF
    Purpose: This research evaluates the digital watermarking technology further for hide/retrieved data into the BMP file by manipulating the contents their pixel value using least significant bits (LSB) approach. Methodology: Various experiments have been applied on the pixel value of the BMP file to hide/store the maximum data. With a condition the size and the quality of the BMP file will not change. The trail and error methods have been used or applied to check the various sizes with various qualities. Findings: The study finds that the any digital data can be hiding into the BMP file by manipulating the contents of the Red Green Blue (RGB) value by applying least significant approach. Originality/Value: Due to the growing usage of multimedia content on the internet, serious issues have emerged. Counterfeiting, forgery fraud and pirating of this content are rising. The research is a mechanism which can help resolve the ownership issues for digital data

    Using Digital Watermarking for Copyright Protection

    Get PDF

    The Johnsonian December 3, 1979

    Get PDF
    The Johnsonian is the weekly student newspaper of Winthrop University. It is published during fall and spring semesters with the exception of university holidays and exam periods. We have proudly served the Winthrop and Rock Hill community since 1923.https://digitalcommons.winthrop.edu/thejohnsonian1970s/1227/thumbnail.jp

    The Johnsonian October 29, 1979

    Get PDF
    The Johnsonian is the weekly student newspaper of Winthrop University. It is published during fall and spring semesters with the exception of university holidays and exam periods. We have proudly served the Winthrop and Rock Hill community since 1923.https://digitalcommons.winthrop.edu/thejohnsonian1970s/1223/thumbnail.jp

    Digital Watermarking: Digital Data Hiding techniques for BMP Images

    Get PDF
    Purpose: This research evaluates the digital watermarking technology further for hide/retrieved data into the BMP file by manipulating the contents their pixel value using least significant bits (LSB) approach. Methodology: Various experiments have been applied on the pixel value of the BMP file to hide/store the maximum data. With a condition the size and the quality of the BMP file will not change. The trail and error methods have been used or applied to check the various sizes with various qualities. Findings: The study finds that the any digital data can be hiding into the BMP file by manipulating the contents of the Red Green Blue (RGB) value by applying least significant approach. Originality/Value: Due to the growing usage of multimedia content on the internet, serious issues have emerged. Counterfeiting, forgery fraud and pirating of this content are rising. The research is a mechanism which can help resolve the ownership issues for digital data

    The Effect of Technical Changes in Industry on Teaching Bookkeeping in High School

    Get PDF
    The purpose of this study was to determine: (a) employment policies concerning high school graduates; (b) use of types of adding and calculating machines as well as computers; (c) types of activities performed; and (d) attitudes and skills of applicants. Business firms in cities in Illinois, Iowa, Minnesota, and Wisconsin were chosen rather subjectively for this study. Letters and questionnaires were sent to them. A 99 per cent return was obtained. Data was analyzed and tabulated. The findings present: (a) employment policies concerning high school graduates and activities they will perform, attitudes most preferred by employers in employees, and types of tests administered to prospective employees; (b) types of employee job-training programs; (c) types of office machines and computers in use; and (d) helpful suggestions from employers. The findings disclosed the possible employment of high school graduates who possess certain skills and attitudes; the use of various adding, calculating, and bookkeeping machines, as well as extensive use of computers. Present industrial conditions and government regulations indicate the need of intelligent and well-prepared accountants. Possible recommendations are (a) high school business education teachers should encourage bookkeeping students of high caliber to enroll in college accounting classes before applying for an accounting position; (b) students should learn to operate ten-key adding machines; (c) students should be familiar with the more common computer terminology; and (d) teachers must keep up with the rapid changes in the accounting profession

    Data hiding in multimedia - theory and applications

    Get PDF
    Multimedia data hiding or steganography is a means of communication using subliminal channels. The resource for the subliminal communication scheme is the distortion of the original content that can be tolerated. This thesis addresses two main issues of steganographic communication schemes: 1. How does one maximize the distortion introduced without affecting fidelity of the content? 2. How does one efficiently utilize the resource (the distortion introduced) for communicating as many bits of information as possible? In other words, what is a good signaling strategy for the subliminal communication scheme? Close to optimal solutions for both issues are analyzed. Many techniques for the issue for maximizing the resource, viz, the distortion introduced imperceptibly in images and video frames, are proposed. Different signaling strategies for steganographic communication are explored, and a novel signaling technique employing a floating signal constellation is proposed. Algorithms for optimal choices of the parameters of the signaling technique are presented. Other application specific issues like the type of robustness needed are taken into consideration along with the established theoretical background to design optimal data hiding schemes. In particular, two very important applications of data hiding are addressed - data hiding for multimedia content delivery, and data hiding for watermarking (for proving ownership). A robust watermarking protocol for unambiguous resolution of ownership is proposed

    In business today and tomorrow

    No full text
    corecore