Vivek Tomar | Graphic Era University (original) (raw)

Papers by Vivek Tomar

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

International conference, 2013

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of A Statistical Comparison of Digital Image Watermarking Techniques

Special Issue of International Journal of Computer Applications, 2012

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required. So, it has become a challenging task to protect copyright of an individual's creation. Digital watermarking provides a viable and promising solution to protect copyright and authentication of the ownership. In this paper, we have performed a statistical comparison of different Digital Image Watermarking techniques (LSB, DCT based and DWT based) that can be used to protect copyright of digital Image. We have also provided the statistical comparison of these techniques that can help us to know the pros and cons of these techniques. This statistical comparison can further be used to improvise and propose new techniques for the same.

Research paper thumbnail of GUI Layer Based General Purpose Routing Protocol Simulation Architecture

National Conference, 2012

The recent advancements in wireless technology have lead to the development of a new wireless sys... more The recent advancements in wireless technology have lead to the development of a new wireless system called Mobile Adhoc Networks. A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. The traditional protocol such as TCP/IP has limited use in Mobile adhoc networks because of the lack of mobility and resources. This has lead to the development of many routing protocols such as proactive, reactive and hybrid.. A key area of consideration in self organizing ad hoc networks is the routing mechanisms. Wireless networking is an emerging technology that will allow users to access information and services regardless of their geographic position The On-Demand mechanism in IP based networks has become popular due to the lower overheads required in managing routes which make it ideal for even smaller, resource restrained mobile computing devices. In the past years, much work has been done in network routing for path determination and many routing protocols have been studied and used in practical networks .The problem to get shortest paths efficiently is a subject of continual research interest. Research and reviews says that earlier many simulators were designed, but there we have to use different GUI platforms for different routing algorithms, programmer has to design each simulator distinctly. To reduce this complexity, our main job is to design a common GUI platform which can work for different routing algorithm.

Research paper thumbnail of Mining databases on World Wide Web

IJCSI International Journal of Computer Science Issues, 2011

The power of the WWW comes not simply from static HTML pages-which can be very attractive, but th... more The power of the WWW comes not simply from static HTML pages-which can be very attractive, but the important first step into the WWW is especially the ability to support those pages with powerful software, especially when interfacing to databases. The combination of attractive screen displays, exceptionally easy to use controls and navigational aids, and powerful underlying software, has opened up the potential for people everywhere to tap into the vast global information resources of the Internet [1]. There is a lot of data on the Web, some in databases, and some in files or other data sources. The databases may be semi structured or they may be relational, object, or multimedia databases. These databases have to be mined so that useful information is extracted. While we could use many of the data mining techniques to mine the Web databases, the challenge is to locate the databases on the Web. Furthermore, the databases may not be in the format that we need for mining the data. We may need mediators to mediate between the data miners and the databases on the Web. This paper presents the important concepts of the databases on the Web and how these databases have to be mined to extract patterns and trends.

Research paper thumbnail of A SURVEY ON MODERN TRENDS IN DIGITAL WATERMARKING

National Conference, 2012

Digital Watermarking is a relatively new field for researchers, where the main objective is to hi... more Digital Watermarking is a relatively new field for researchers, where the main objective is to hide the important information. The visibility of the information depends on the application requirements, which means the information can be visible or invisible. The explosion in the internet technology has posed the challenge in front of the researchers that how to protect copyright of an individual's creation. The absence of copyright information in the digital data may lead to the loss of revenues. The main requirement of any watermarking technique is that the digital watermark that is embedded with the original data should be inseparable. Many researchers have proposed techniques for digital watermarking that proved to be more robust than the existing approaches. In this paper, we have discussed the watermarking requirements, techniques and applications of watermarking.

Research paper thumbnail of Wavelet-Based Feature Extraction and RCNN for ECG Signal Classification

2023 International Conference on IoT, Communication and Automation Technology (ICICAT)

Research paper thumbnail of Single sample face recognition using deep learning: a survey

Artificial Intelligence Review, Jul 15, 2023

Research paper thumbnail of Conception & implementation of a novel Digital image watermarking algorithm using cascading of DCT and LWT

ABSTRACT The recent development in the internet technology is definitely a boon for the society. ... more ABSTRACT The recent development in the internet technology is definitely a boon for the society. But as far as copyright protection of multimedia content, prevention of unauthorized access, intellectual property rights etc. are concerned, this is an area that needs immediate attention. Now a days it is a relatively easy process to copy the data available on web, modify it and then put it back for individual as well as business profits. Digital Watermarking provides a viable solution by embedding information, which can be further used to prove the ownership or to detect invasion in the copyright multimedia content like text, audio, video etc. In this paper, we have proposed a new algorithm for the watermarking of digital images using cascading of two transforms i.e. Discrete cosine transform DCT and Lifting wavelet transform LWT Proposed algorithm takes the approximation component of the LWT transform of cover image and then applies DCT to embed watermark data Watermarked data is embedded in middle frequency component using comparison based correlation technique. This algorithm has also been compared with the existing ones by applying different image attacks and subsequently measuring the robustness level and proved to be fairly robust.

Research paper thumbnail of Multiresolution-Based Singular Value Decomposition Approach for Breast Cancer Image Classification

BioMed Research International

Breast cancer is the most prevalent form of cancer that can strike at any age; the higher the age... more Breast cancer is the most prevalent form of cancer that can strike at any age; the higher the age, the greater the risk. The presence of malignant tissue has become more frequent in women. Although medical therapy has improved breast cancer diagnostic and treatment methods, still the death rate remains high due to failure of diagnosing breast cancer in its early stages. A classification approach for mammography images based on nonsubsampled contourlet transform (NSCT) is proposed in order to investigate it. The proposed method uses multiresolution NSCT decomposition to the region of interest (ROI) of mammography images and then uses Z-moments for extracting features from the NSCT-decomposed images. The matrix is formed by the components that are extracted from the region of interest and are then subjected to singular value decomposition (SVD) in order to remove the essential features that can generalize globally. The method employs a support vector machine (SVM) classification algor...

Research paper thumbnail of Conception & implementation of a novel digital image watermarking algorithm using cascading of DCT and LWT

ABSTRACT The recent development in the internet technology is definitely a boon for the society. ... more ABSTRACT The recent development in the internet technology is definitely a boon for the society. But as far as copyright protection of multimedia content, prevention of unauthorized access, intellectual property rights etc. are concerned, this is an area that needs immediate attention. Now a days it is a relatively easy process to copy the data available on web, modify it and then put it back for individual as well as business profits. Digital Watermarking provides a viable solution by embedding information, which can be further used to prove the ownership or to detect invasion in the copyright multimedia content like text, audio, video etc. In this paper, we have proposed a new algorithm for the watermarking of digital images using cascading of two transforms i.e. Discrete cosine transform DCT and Lifting wavelet transform LWT Proposed algorithm takes the approximation component of the LWT transform of cover image and then applies DCT to embed watermark data Watermarked data is embedded in middle frequency component using comparison based correlation technique. This algorithm has also been compared with the existing ones by applying different image attacks and subsequently measuring the robustness level and proved to be fairly robust.

Research paper thumbnail of A Statistical Comparison of Digital Image watermarking techniques

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required. So, it has become a challenging task to protect copyright of an individual's creation. Digital watermarking provides a viable and promising solution to protect copyright and authentication of the ownership. In this paper, we have performed a statistical comparison of different Digital

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of A SURVEY ON MODERN TRENDS IN DIGITAL WATERMARKING

Digital Watermarking is a relatively new field for researchers, where the main objective is to hi... more Digital Watermarking is a relatively new field for researchers, where the main objective is to hide the important information. The visibility of the information depends on the application requirements, which means the information can be visible or invisible. The explosion in the internet technology has posed the challenge in front of the researchers that how to protect copyright of an individual's creation. The absence of copyright information in the digital data may lead to the loss of revenues. The main requirement of any watermarking technique is that the digital watermark that is embedded with the original data should be inseparable. Many researchers have proposed techniques for digital watermarking that proved to be more robust than the existing approaches. In this paper, we have discussed the watermarking requirements, techniques and applications of watermarking.

Research paper thumbnail of Special Issue of International Journal of Computer Applications (0975 -8887) 3rd International IT Summit Confluence 2012 -The Next Generation Information Technology Summit 6

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required.

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of Conception Implementation of a Novel Digital Image Watermarking Algorithm using Cascading of DCT and LWT

Research paper thumbnail of A SURVEY ON MODERN TRENDS IN DIGITAL WATERMARKING

Digital Watermarking is a relatively new field for researchers, where the main objective is to hi... more Digital Watermarking is a relatively new field for researchers, where the main objective is to hide the important information. The visibility of the information depends on the application requirements, which means the information can be visible or invisible. The explosion in the internet technology has posed the challenge in front of the researchers that how to protect copyright of an individual's creation. The absence of copyright information in the digital data may lead to the loss of revenues. The main requirement of any watermarking technique is that the digital watermark that is embedded with the original data should be inseparable. Many researchers have proposed techniques for digital watermarking that proved to be more robust than the existing approaches. In this paper, we have discussed the watermarking requirements, techniques and applications of watermarking.

Research paper thumbnail of Special Issue of International Journal of Computer Applications (0975 -8887) 3rd International IT Summit Confluence 2012 -The Next Generation Information Technology Summit 6

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required.

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

International conference, 2013

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of A Statistical Comparison of Digital Image Watermarking Techniques

Special Issue of International Journal of Computer Applications, 2012

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required. So, it has become a challenging task to protect copyright of an individual's creation. Digital watermarking provides a viable and promising solution to protect copyright and authentication of the ownership. In this paper, we have performed a statistical comparison of different Digital Image Watermarking techniques (LSB, DCT based and DWT based) that can be used to protect copyright of digital Image. We have also provided the statistical comparison of these techniques that can help us to know the pros and cons of these techniques. This statistical comparison can further be used to improvise and propose new techniques for the same.

Research paper thumbnail of GUI Layer Based General Purpose Routing Protocol Simulation Architecture

National Conference, 2012

The recent advancements in wireless technology have lead to the development of a new wireless sys... more The recent advancements in wireless technology have lead to the development of a new wireless system called Mobile Adhoc Networks. A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. The traditional protocol such as TCP/IP has limited use in Mobile adhoc networks because of the lack of mobility and resources. This has lead to the development of many routing protocols such as proactive, reactive and hybrid.. A key area of consideration in self organizing ad hoc networks is the routing mechanisms. Wireless networking is an emerging technology that will allow users to access information and services regardless of their geographic position The On-Demand mechanism in IP based networks has become popular due to the lower overheads required in managing routes which make it ideal for even smaller, resource restrained mobile computing devices. In the past years, much work has been done in network routing for path determination and many routing protocols have been studied and used in practical networks .The problem to get shortest paths efficiently is a subject of continual research interest. Research and reviews says that earlier many simulators were designed, but there we have to use different GUI platforms for different routing algorithms, programmer has to design each simulator distinctly. To reduce this complexity, our main job is to design a common GUI platform which can work for different routing algorithm.

Research paper thumbnail of Mining databases on World Wide Web

IJCSI International Journal of Computer Science Issues, 2011

The power of the WWW comes not simply from static HTML pages-which can be very attractive, but th... more The power of the WWW comes not simply from static HTML pages-which can be very attractive, but the important first step into the WWW is especially the ability to support those pages with powerful software, especially when interfacing to databases. The combination of attractive screen displays, exceptionally easy to use controls and navigational aids, and powerful underlying software, has opened up the potential for people everywhere to tap into the vast global information resources of the Internet [1]. There is a lot of data on the Web, some in databases, and some in files or other data sources. The databases may be semi structured or they may be relational, object, or multimedia databases. These databases have to be mined so that useful information is extracted. While we could use many of the data mining techniques to mine the Web databases, the challenge is to locate the databases on the Web. Furthermore, the databases may not be in the format that we need for mining the data. We may need mediators to mediate between the data miners and the databases on the Web. This paper presents the important concepts of the databases on the Web and how these databases have to be mined to extract patterns and trends.

Research paper thumbnail of A SURVEY ON MODERN TRENDS IN DIGITAL WATERMARKING

National Conference, 2012

Digital Watermarking is a relatively new field for researchers, where the main objective is to hi... more Digital Watermarking is a relatively new field for researchers, where the main objective is to hide the important information. The visibility of the information depends on the application requirements, which means the information can be visible or invisible. The explosion in the internet technology has posed the challenge in front of the researchers that how to protect copyright of an individual's creation. The absence of copyright information in the digital data may lead to the loss of revenues. The main requirement of any watermarking technique is that the digital watermark that is embedded with the original data should be inseparable. Many researchers have proposed techniques for digital watermarking that proved to be more robust than the existing approaches. In this paper, we have discussed the watermarking requirements, techniques and applications of watermarking.

Research paper thumbnail of Wavelet-Based Feature Extraction and RCNN for ECG Signal Classification

2023 International Conference on IoT, Communication and Automation Technology (ICICAT)

Research paper thumbnail of Single sample face recognition using deep learning: a survey

Artificial Intelligence Review, Jul 15, 2023

Research paper thumbnail of Conception & implementation of a novel Digital image watermarking algorithm using cascading of DCT and LWT

ABSTRACT The recent development in the internet technology is definitely a boon for the society. ... more ABSTRACT The recent development in the internet technology is definitely a boon for the society. But as far as copyright protection of multimedia content, prevention of unauthorized access, intellectual property rights etc. are concerned, this is an area that needs immediate attention. Now a days it is a relatively easy process to copy the data available on web, modify it and then put it back for individual as well as business profits. Digital Watermarking provides a viable solution by embedding information, which can be further used to prove the ownership or to detect invasion in the copyright multimedia content like text, audio, video etc. In this paper, we have proposed a new algorithm for the watermarking of digital images using cascading of two transforms i.e. Discrete cosine transform DCT and Lifting wavelet transform LWT Proposed algorithm takes the approximation component of the LWT transform of cover image and then applies DCT to embed watermark data Watermarked data is embedded in middle frequency component using comparison based correlation technique. This algorithm has also been compared with the existing ones by applying different image attacks and subsequently measuring the robustness level and proved to be fairly robust.

Research paper thumbnail of Multiresolution-Based Singular Value Decomposition Approach for Breast Cancer Image Classification

BioMed Research International

Breast cancer is the most prevalent form of cancer that can strike at any age; the higher the age... more Breast cancer is the most prevalent form of cancer that can strike at any age; the higher the age, the greater the risk. The presence of malignant tissue has become more frequent in women. Although medical therapy has improved breast cancer diagnostic and treatment methods, still the death rate remains high due to failure of diagnosing breast cancer in its early stages. A classification approach for mammography images based on nonsubsampled contourlet transform (NSCT) is proposed in order to investigate it. The proposed method uses multiresolution NSCT decomposition to the region of interest (ROI) of mammography images and then uses Z-moments for extracting features from the NSCT-decomposed images. The matrix is formed by the components that are extracted from the region of interest and are then subjected to singular value decomposition (SVD) in order to remove the essential features that can generalize globally. The method employs a support vector machine (SVM) classification algor...

Research paper thumbnail of Conception & implementation of a novel digital image watermarking algorithm using cascading of DCT and LWT

ABSTRACT The recent development in the internet technology is definitely a boon for the society. ... more ABSTRACT The recent development in the internet technology is definitely a boon for the society. But as far as copyright protection of multimedia content, prevention of unauthorized access, intellectual property rights etc. are concerned, this is an area that needs immediate attention. Now a days it is a relatively easy process to copy the data available on web, modify it and then put it back for individual as well as business profits. Digital Watermarking provides a viable solution by embedding information, which can be further used to prove the ownership or to detect invasion in the copyright multimedia content like text, audio, video etc. In this paper, we have proposed a new algorithm for the watermarking of digital images using cascading of two transforms i.e. Discrete cosine transform DCT and Lifting wavelet transform LWT Proposed algorithm takes the approximation component of the LWT transform of cover image and then applies DCT to embed watermark data Watermarked data is embedded in middle frequency component using comparison based correlation technique. This algorithm has also been compared with the existing ones by applying different image attacks and subsequently measuring the robustness level and proved to be fairly robust.

Research paper thumbnail of A Statistical Comparison of Digital Image watermarking techniques

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required. So, it has become a challenging task to protect copyright of an individual's creation. Digital watermarking provides a viable and promising solution to protect copyright and authentication of the ownership. In this paper, we have performed a statistical comparison of different Digital

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of A SURVEY ON MODERN TRENDS IN DIGITAL WATERMARKING

Digital Watermarking is a relatively new field for researchers, where the main objective is to hi... more Digital Watermarking is a relatively new field for researchers, where the main objective is to hide the important information. The visibility of the information depends on the application requirements, which means the information can be visible or invisible. The explosion in the internet technology has posed the challenge in front of the researchers that how to protect copyright of an individual's creation. The absence of copyright information in the digital data may lead to the loss of revenues. The main requirement of any watermarking technique is that the digital watermark that is embedded with the original data should be inseparable. Many researchers have proposed techniques for digital watermarking that proved to be more robust than the existing approaches. In this paper, we have discussed the watermarking requirements, techniques and applications of watermarking.

Research paper thumbnail of Special Issue of International Journal of Computer Applications (0975 -8887) 3rd International IT Summit Confluence 2012 -The Next Generation Information Technology Summit 6

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required.

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.

Research paper thumbnail of Conception Implementation of a Novel Digital Image Watermarking Algorithm using Cascading of DCT and LWT

Research paper thumbnail of A SURVEY ON MODERN TRENDS IN DIGITAL WATERMARKING

Digital Watermarking is a relatively new field for researchers, where the main objective is to hi... more Digital Watermarking is a relatively new field for researchers, where the main objective is to hide the important information. The visibility of the information depends on the application requirements, which means the information can be visible or invisible. The explosion in the internet technology has posed the challenge in front of the researchers that how to protect copyright of an individual's creation. The absence of copyright information in the digital data may lead to the loss of revenues. The main requirement of any watermarking technique is that the digital watermark that is embedded with the original data should be inseparable. Many researchers have proposed techniques for digital watermarking that proved to be more robust than the existing approaches. In this paper, we have discussed the watermarking requirements, techniques and applications of watermarking.

Research paper thumbnail of Special Issue of International Journal of Computer Applications (0975 -8887) 3rd International IT Summit Confluence 2012 -The Next Generation Information Technology Summit 6

Due to the rapid advancement in internet technology and evolution of high speed networks operatin... more Due to the rapid advancement in internet technology and evolution of high speed networks operating throughout the world, protection of multimedia content is urgently required.

Research paper thumbnail of A ROBUST DIGITAL IMAGE WATERMARKING TECHNIQUE USING CASCADING OF DCT AND DWT

In recent times, the continuous improvement in the internet technology has been a boon but also g... more In recent times, the continuous improvement in the internet technology has been a boon but also given rise to many problems. These problems mainly include unauthorized reproduction of digital contents like audio, video, images etc. So, this led to the evolution of a new field of digital watermarking. This problem has also posed the challenge in front of the researchers to give new techniques to protect copyright of an individual's creation. Many researchers have given their algorithms for digital image watermarking which have better performance and proved to be more robust than the existing ones. In this paper, we have proposed a new technique for the watermarking of digital images using the cascading of DCT and DWT. This scheme has proved to be more robust than the existing ones. This technique mainly uses the approximation component of the wavelet transformed image and then uses the comparison based correlation method for embedding the watermark. A comparison of this technique has also been shown with the existing techniques.