Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "ebe03e96-e1a3-4782-bcce-d0b2bf155940"}, "_deposit": {"id": "3475", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3475"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3475", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "DCT Based Digital Image Watermarking System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Digital image watermarking is a method trying to embed small image inside a large original image. The original image will be converted into frequency domain to obtain the Discrete Cosine Transform (DCT) matrices from its block. DCT is mathematical tools, for embedding data into an image, to transform a signal from spatial to frequency domain. The logo image is embedded in random color components of the original image, as well as in random positions in each selected block. RC4, a pseudorandom bit generator, produces a stream of 8-bit numbers that are supposed to be truly random. The stream cannot be predicted without knowledge of the input key. RC4 is used to prevent from attackers when transferring watermark digital image pass over insecure network. After constructed the digital watermark image, send the image from sender side to receiver side. On the receiver side, accept the watermark image and extract the watermark image, by using IDCT and hidden logo image is received at the receiver side."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Steganography"}, {"interim": "Digital Image Watermarking"}, {"interim": "DCT"}, {"interim": "RC4"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (27).pdf", "filesize": [{"value": "579 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 579000.0, "url": {"url": "https://meral.edu.mm/record/3475/files/psc2010paper (27).pdf"}, "version_id": "597221ec-de06-4ecb-9df9-4c0e36dd69e7"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth  Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myint, May Phone"}, {"subitem_authors_fullname": "Win, Thandar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1221"}, "item_title": "DCT Based Digital Image Watermarking System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003475", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3475", "relation": {}, "relation_version_is_last": true, "title": ["DCT Based Digital Image Watermarking System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

DCT Based Digital Image Watermarking System

http://hdl.handle.net/20.500.12678/0000003475
http://hdl.handle.net/20.500.12678/0000003475
9fe34fe0-fde4-4542-a8f6-4040099bc035
ebe03e96-e1a3-4782-bcce-d0b2bf155940
None
Preview
Name / File License Actions
psc2010paper psc2010paper (27).pdf (579 Kb)
Publication type
Article
Upload type
Publication
Title
Title DCT Based Digital Image Watermarking System
Language en
Publication date 2010-12-16
Authors
Myint, May Phone
Win, Thandar
Description
Digital image watermarking is a method trying to embed small image inside a large original image. The original image will be converted into frequency domain to obtain the Discrete Cosine Transform (DCT) matrices from its block. DCT is mathematical tools, for embedding data into an image, to transform a signal from spatial to frequency domain. The logo image is embedded in random color components of the original image, as well as in random positions in each selected block. RC4, a pseudorandom bit generator, produces a stream of 8-bit numbers that are supposed to be truly random. The stream cannot be predicted without knowledge of the input key. RC4 is used to prevent from attackers when transferring watermark digital image pass over insecure network. After constructed the digital watermark image, send the image from sender side to receiver side. On the receiver side, accept the watermark image and extract the watermark image, by using IDCT and hidden logo image is received at the receiver side.
Keywords
Steganography, Digital Image Watermarking, DCT, RC4
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1221
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:00:40.182623
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL