Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    • Computer Applications
    • by 
The digital assets are widely transmitted on the internet. This increases the redistribution of digital images with or without owner’s consent. Similarly, the secure communication on the internet is not an easy task. The unauthorized... more
    • by 
    • Computer Science
This research paper introduces a novel algorithm can be applied either, in the area of digital watermarking and steganography, separately or together. This amalgamated algorithm, MP_2, is evolved for enhancement of secrecy level of a... more
    • by 
    • Computer Science
The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the... more
    • by 
    •   7  
      Computer ScienceImage ProcessingDigital WatermarkingEXTRACTION