Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "f730b95c-896b-4aa5-b39a-a0a1ef784482"}, "_deposit": {"id": "4952", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4952"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4952", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Performance Analys is of Image Authentication between  DCT and DWT Watermarking", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms such as cryptographic mechanisms and digital watermarking techniques. In this paper, image authentication between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) watermarking is analyzed in performance comparison. On-line handwritten signature is acquired G-Pen F350 tablet encodes the signature which creates own signature image of different users and is used as watermark. The same digital watermarking embedding and extracting algorithms based on DCT and DWT are discussed and implemented. As in experimental results for the robustness and performance comparison, Peak Signal to Noise Ratio ( PSNR) and Normal Correlation (NC) are estimated from different standard images."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Authentication"}, {"interim": "cryptographic mechanism"}, {"interim": "digital watermarking"}, {"interim": "DCT"}, {"interim": "DWT"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11091.pdf", "filesize": [{"value": "376 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 376000.0, "url": {"url": "https://meral.edu.mm/record/4952/files/11091.pdf"}, "version_id": "07d89f48-8f83-4af6-9919-8d3d3e82e000"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "kyaw, Mya Thidar"}, {"subitem_authors_fullname": "Soe, Kyi"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/851"}, "item_title": "Performance Analys is of Image Authentication between  DCT and DWT Watermarking", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004952", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4952", "relation": {}, "relation_version_is_last": true, "title": ["Performance Analys is of Image Authentication between  DCT and DWT Watermarking"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Performance Analys is of Image Authentication between DCT and DWT Watermarking

http://hdl.handle.net/20.500.12678/0000004952
http://hdl.handle.net/20.500.12678/0000004952
7553275d-5128-4082-9434-9b143faad0a5
f730b95c-896b-4aa5-b39a-a0a1ef784482
None
Preview
Name / File License Actions
11091.pdf 11091.pdf (376 Kb)
Publication type
Article
Upload type
Publication
Title
Title Performance Analys is of Image Authentication between DCT and DWT Watermarking
Language en
Publication date 2013-02-26
Authors
kyaw, Mya Thidar
Soe, Kyi
Description
Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms such as cryptographic mechanisms and digital watermarking techniques. In this paper, image authentication between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) watermarking is analyzed in performance comparison. On-line handwritten signature is acquired G-Pen F350 tablet encodes the signature which creates own signature image of different users and is used as watermark. The same digital watermarking embedding and extracting algorithms based on DCT and DWT are discussed and implemented. As in experimental results for the robustness and performance comparison, Peak Signal to Noise Ratio ( PSNR) and Normal Correlation (NC) are estimated from different standard images.
Keywords
Image Authentication, cryptographic mechanism, digital watermarking, DCT, DWT
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/851
Journal articles
Eleventh International Conference On Computer Applications (ICCA 2013)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:33:58.218669
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL