Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "49e2eff3-f003-4a7c-bb26-2a0a1fc4fd04"}, "_deposit": {"id": "3637", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3637"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3637", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A LWT and DCT based Blind Watermarking Scheme for Digital Images", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "As a potential solution to defendunauthorized replication of digital multimediaobjects, digital watermarking technology is nowattracting significant attention. With a combination ofLifting Wavelet Transform (LWT) and DiscreteCosine Transform (DCT), the system is presented. Keysequences used for watermark embedding andextraction are generated by Linear CongruentialGenerator (LCG). Moreover, for the sake of securityenhancement, double coded image puzzling method iscreated. The LWT is applied to decompose theoriginal image into four sub-band images. Then theDCT is computed on the selected sub-band of the LWTcoefficients. The watermark bits are modified by LCGand embedded in the DCT transformed of the selectedLWT sub-band of the original image. The Doublecodedimage puzzling is created in order not torecognize the meaningful image by illegal users. Theproposed system mainly focuses on an invisiblewatermark embedding, imperceptibility ofwatermarked image, blind watermarking by using keysequence instead of using original image, androbustness for watermark extraction. The presentedsystem is realized in MATLAB."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12049.pdf", "filesize": [{"value": "347 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 347000.0, "url": {"url": "https://meral.edu.mm/record/3637/files/12049.pdf"}, "version_id": "aca4832e-196c-4125-8960-173a9cc715bb"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Twelfth International Conference On Computer Applications (ICCA 2014)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Tun, Amy"}, {"subitem_authors_fullname": "Thein, Yadana"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-17"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/137"}, "item_title": "A LWT and DCT based Blind Watermarking Scheme for Digital Images", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003637", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3637", "relation": {}, "relation_version_is_last": true, "title": ["A LWT and DCT based Blind Watermarking Scheme for Digital Images"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

A LWT and DCT based Blind Watermarking Scheme for Digital Images

http://hdl.handle.net/20.500.12678/0000003637
http://hdl.handle.net/20.500.12678/0000003637
fbf7ff6b-3f22-48d6-a672-46645b2cb7d7
49e2eff3-f003-4a7c-bb26-2a0a1fc4fd04
None
Preview
Name / File License Actions
12049.pdf 12049.pdf (347 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:13:55.542919
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL