MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "f730b95c-896b-4aa5-b39a-a0a1ef784482"}, "_deposit": {"id": "4952", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4952"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4952", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Performance Analys is of Image Authentication between DCT and DWT Watermarking", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms such as cryptographic mechanisms and digital watermarking techniques. In this paper, image authentication between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) watermarking is analyzed in performance comparison. On-line handwritten signature is acquired G-Pen F350 tablet encodes the signature which creates own signature image of different users and is used as watermark. The same digital watermarking embedding and extracting algorithms based on DCT and DWT are discussed and implemented. As in experimental results for the robustness and performance comparison, Peak Signal to Noise Ratio ( PSNR) and Normal Correlation (NC) are estimated from different standard images."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Authentication"}, {"interim": "cryptographic mechanism"}, {"interim": "digital watermarking"}, {"interim": "DCT"}, {"interim": "DWT"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "11091.pdf", "filesize": [{"value": "376 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 376000.0, "url": {"url": "https://meral.edu.mm/record/4952/files/11091.pdf"}, "version_id": "07d89f48-8f83-4af6-9919-8d3d3e82e000"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "kyaw, Mya Thidar"}, {"subitem_authors_fullname": "Soe, Kyi"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/851"}, "item_title": "Performance Analys is of Image Authentication between DCT and DWT Watermarking", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004952", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4952", "relation": {}, "relation_version_is_last": true, "title": ["Performance Analys is of Image Authentication between DCT and DWT Watermarking"], "weko_shared_id": -1}
Performance Analys is of Image Authentication between DCT and DWT Watermarking
http://hdl.handle.net/20.500.12678/0000004952
http://hdl.handle.net/20.500.12678/00000049527553275d-5128-4082-9434-9b143faad0a5
f730b95c-896b-4aa5-b39a-a0a1ef784482
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Performance Analys is of Image Authentication between DCT and DWT Watermarking | |||||
Language | en | |||||
Publication date | 2013-02-26 | |||||
Authors | ||||||
kyaw, Mya Thidar | ||||||
Soe, Kyi | ||||||
Description | ||||||
Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms such as cryptographic mechanisms and digital watermarking techniques. In this paper, image authentication between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) watermarking is analyzed in performance comparison. On-line handwritten signature is acquired G-Pen F350 tablet encodes the signature which creates own signature image of different users and is used as watermark. The same digital watermarking embedding and extracting algorithms based on DCT and DWT are discussed and implemented. As in experimental results for the robustness and performance comparison, Peak Signal to Noise Ratio ( PSNR) and Normal Correlation (NC) are estimated from different standard images. | ||||||
Keywords | ||||||
Image Authentication, cryptographic mechanism, digital watermarking, DCT, DWT | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/851 | |||||
Journal articles | ||||||
Eleventh International Conference On Computer Applications (ICCA 2013) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |