Volume 08 Issue 05, September 2020

A Survey on Enhanced Robustness Grayscale Image Hybrid Multiple Watermarking Technique

Ankit Choubey, Manish Rai

Page no:01-05

Abstract

Digital watermarking technology may be a frontier research field, and it mainly focuses on the property rights, identification ion and authentication of the digital media to shield the essential documents. Consistent with the fundamental analysis of digital image watermarking the digital watermarking model consists of two modules, which are watermark embedding module and watermark extraction and detection module. Digital documents are often copied and scattered quickly to large numbers of individuals with none cost. People can download audio, image files, and that they can share them with friends and that they can influence or change their original contents. Because of this, there's more probability of the copying of such digital information. So, there's an urgent need of prohibiting such illegitimate copyright of digital media. Digital watermarking (DWM) is the dominant solution to the present problem. This paper aims to supply an exhaustive study of digital watermarking techniques primarily focuses on digital image watermarking DCT, and its applications used in many today in the real world. It had been supported the mixture of three transformations: the discrete wavelet transform (DWT), discrete cosine transform (DCT) and, the singular value decomposition (SVD) and also hybrid multiple watermarking techniques are low robustness and low PSNR. During this paper, three watermark images of sizes NXN, host image 512x 512, the effectiveness of the proposed method in terms of quality and robustness compared to other reported watermarking technique.

A Survey Paper on Improving Performance of WSN Based on Range Based Approaches

Paramjeet Kour, Rajesh Nema

Page no:06-09

Abstract

Analysis Localization error minimization primarily based several applications of wireless sensing element networks (WSN) need data regarding the geographical location of every sensing element node. Self-organization and localization capabilities are one in every of the foremost necessary needs in sensing element networks. This paper provides a summary of centralized distance-based algorithms for estimating the positions of nodes in a very sensing element network. Secure localization of unknown nodes in a very Wireless sensing element Network (WSN) is a fundamental analysis subject Wireless sensing element Networks (WSN), a component of pervasive computing, are presently getting used on an oversized scale to observe period environmental standing but these sensors operate below extreme energy constraints are designed by keeping an application in mind. Planning a brand new wireless sensing element node is a tough task and involves assessing a variety of various parameters needed by the target application. In survey realize drawback not sense positioning of nodes .but planned formula achieve the optimum location of nodes supported minimize error and very best answer in WSN. Localization algorithms mentioned with their benefits and drawbacks. Lastly, a comparative study of localization algorithms supported the performance in WSN.

Image Authentication Based on Reversible Image Data Hiding Technique and PBCT

Chandra Gupta, Dr. Rajeev Gupta

Page no:10-15

Abstract

Novel binary change technique (PBCT) is reversible picture information concealing dependent on picture validation and called the proposed strategy. An existing method as a swap for the proposed procedure of attempting to keep the PSNR esteem high and upgrades the validation of unique picture information to improve its information concealing quality. The twofold piece changes in the histogram are chosen for information implanting. Reversible information stowing away can be characterized as a methodology where the information is covered up in the host media, for example, picture, sound and video records. Reversible data hiding (RDH) or lossless information stowing away is a strategy by which the first spread can be losslessly reestablished after the implanted data is extricated. Concealing data pulverizes the host picture, although the bending acquainted by stowing away is subtle with the human visual framework. Reversible information concealing strategies are intended to tackle the issue of lossless inserting of huge messages in computerized pictures so that after the implanted message is removed, the picture can be reestablished totally to its unique state before installing happened. To shield this information from unapproved access and altering different techniques for information concealing like cryptography, hashing, confirmation has been created and are by and by today. Picture information concealing handling time more mistake at that point conquer this detriment and with no loss of unique information picture are removing by novel binary change technique (PBCT). Reversible information concealing strategies recoups the first transporter precisely after the extraction of the mystery encoded information. Reversible information concealing procedures are grouped depending on the novel binary change technique (PBCT)) of implementation. In this investigation, they will examine one such information concealing method called picture verification dependent on reversible picture information concealing method and PBCT. PBCT is the way toward hiding delicate data in any media to move it safely over the fundamental untrustworthy and unstable correspondence organize. The proposed strategy contrasts with existing procedure different boundaries based like PSNR and MSE. The proposed technique is improving PSNR and minimization error values in image data hiding both techniques comparative analysis of find best image authentication.