Please use this identifier to cite or link to this item:
Title: Multiple watermarking approaches using enhanced image processing techniques and visual cryptography
Researcher: Mathivadhani D
Guide(s): Meena C
Keywords: Computer Science
Image processing techniques
Visual cryptography
Upload Date: 27-Nov-2013
University: Avinashilingam Deemed University For Women
Completed Date: March, 2012
Abstract: A Digital Watermark is defined as invisible or inaudible data (a random pattern of bits or noise) permanently embedded in a graphic, video, or audio file for protecting, copyright or authenticating data. Multiple watermarking is defined as a process that embeds more than one watermark in the cover image. Multiple watermarking combine the advantages of single watermarking algorithms to create a sophisticated multiple watermarking scheme, which is efficient in terms of robustness and security. Visual Cryptography (VC) is a Secret Sharing Scheme extended for images. It has the ability to restore the secret data without the use of computations. In the present study, VC is used in conjunction with watermarking to allow multiple watermarks to be embedded in the same image without modifying the host image. The main goal of the present research work is to develop sophisticated multiple watermarking schemes with visual cryptography for information hiding, copyright protection and authentication. To achieve this goal, the work is divided into two stages. Stage 1: Propose and develop single watermarking algorithms for information hiding, copyright protection and authentication and select a winning algorithm for each area. Stage 2: Use the selected algorithm and develop multiple watermarking schemes. In Stage 1, four single watermarking schemes are proposed. The first technique combines Visual Cryptography and enhanced traditional Least Significant Bit (LSB) technique to create a robust and secure watermarking technique. A feature-based modified KP-Gillies algorithm combined with Visual Cryptography is the second proposed single watermarking system. The third model combines discrete wavelet transformation with singular value decomposition and visual cryptography. The fourth model combines discrete wavelet packet transformation with independent component analysis and visual cryptography.
Pagination: 171p.
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File80.58 kBAdobe PDFView/Open
02_certificate & acknowlegdements.pdf212.22 kBAdobe PDFView/Open
03-abstract.pdf84.95 kBAdobe PDFView/Open
04_contents.pdf112.04 kBAdobe PDFView/Open
05_list of tables & figures.pdf210.31 kBAdobe PDFView/Open
06_chapter 1.pdf476.89 kBAdobe PDFView/Open
07_chapter2.pdf264.81 kBAdobe PDFView/Open
08_chapter 3.pdf497.57 kBAdobe PDFView/Open
09_chapter 4.pdf10.8 MBAdobe PDFView/Open
10_chapter 5.pdf13.79 kBAdobe PDFView/Open
11_bibiography.pdf46.66 kBAdobe PDFView/Open
12_list of publications.pdf6.6 kBAdobe PDFView/Open
13_figure.pdf7.3 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: