The digital assets are widely transmitted on the internet. This increases the redistribution of digital images with or without owner’s consent. Similarly, the secure communication on the internet is not an easy task. The unauthorized... more
The digital assets are widely transmitted on the internet. This increases the redistribution of digital images with or without owner’s consent. Similarly, the secure communication on the internet is not an easy task. The unauthorized access to message can prove harmful in defense. The research paper is analyzing two spatial domain-based methods which have different application. The research work concludes two different techniques used in two different domain having same method of application. Index Terms Watermarking, Steganography, Cryptography, Spatial Domain, Secret Communication, ________________________________________________________________________________________________________
This research paper introduces a novel algorithm can be applied either, in the area of digital watermarking and steganography, separately or together. This amalgamated algorithm, MP_2, is evolved for enhancement of secrecy level of a... more
This research paper introduces a novel algorithm can be applied either, in the area of digital watermarking and steganography, separately or together. This amalgamated algorithm, MP_2, is evolved for enhancement of secrecy level of a confidential message communication and imperceptibility of a watermark in the digital steganography and watermarking domain. The research work has employed matrix transformation technique to evolve embedment and encryption algorithm. This algorithm is classified in the reversible algorithm in the area of digital watermarking technique steganography.
The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the... more
The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under the copyright act is illegal and a robust mechanism is required to curb this kind of unauthorized copy. To safeguard the copyright digital assets, a robust digital watermarking technique is needed. The existing digital watermarking techniques protect digital assets by embedding a digital watermark into a host digital image. This embedding does induce slight distortion in the host image but the distortion is usually too small to be noticed. At the same time the embedded watermark must be robust enough to with stand deliberate attacks. There are various techniques of digital watermarking but rese...