Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • MERAL
  • Universities
  • Ranking
AND
To


Index Link

Index Tree

WEKO

One fine body…

Item

{"_buckets": {"deposit": "f730b95c-896b-4aa5-b39a-a0a1ef784482"}, "_deposit": {"id": "4952", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4952"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4952"}, "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Performance Analys is of Image Authentication between  DCT and DWT Watermarking", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms such as cryptographic mechanisms and digital watermarking techniques. In this paper, image authentication between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) watermarking is analyzed in performance comparison. On-line handwritten signature is acquired G-Pen F350 tablet encodes the signature which creates own signature image of different users and is used as watermark. The same digital watermarking embedding and extracting algorithms based on DCT and DWT are discussed and implemented. As in experimental results for the robustness and performance comparison, Peak Signal to Noise Ratio ( PSNR) and Normal Correlation (NC) are estimated from different standard images."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Image Authentication"}, {"interim": "cryptographic mechanism"}, {"interim": "digital watermarking"}, {"interim": "DCT"}, {"interim": "DWT"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-12"}], "displaytype": "preview", "download_preview_message": "", "filename": "11091.pdf", "filesize": [{"value": "376 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 376000, "url": {"url": "https://meral.edu.mm/record/4952/files/11091.pdf"}, "version_id": "07d89f48-8f83-4af6-9919-8d3d3e82e000"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "kyaw, Mya Thidar"}, {"subitem_authors_fullname": "Soe, Kyi"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_name_i18n": "Upload type", "attribute_value": "Publication"}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_name_i18n": "Publication type", "attribute_value": "Article"}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_name_i18n": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/851"}, "item_title": "Performance Analys is of Image Authentication between  DCT and DWT Watermarking", "item_type_id": "21", "owner": "1", "path": ["1582963302567/1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004952", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-12"}, "publish_date": "2019-07-12", "publish_status": "0", "recid": "4952", "relation": {}, "relation_version_is_last": true, "title": ["Performance Analys is of Image Authentication between  DCT and DWT Watermarking"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Performance Analys is of Image Authentication between DCT and DWT Watermarking

http://hdl.handle.net/20.500.12678/0000004952
7553275d-5128-4082-9434-9b143faad0a5
f730b95c-896b-4aa5-b39a-a0a1ef784482
Preview
Name / File License Actions
11091.pdf 11091.pdf (376 Kb)
Publication type Article
Upload type Publication
Title
Performance Analys is of Image Authentication between DCT and DWT Watermarking
en
Publication date 2013-02-26
Authors
kyaw, Mya Thidar
Soe, Kyi
Description
Security has become one of the most significant and challenging problems for spreading new information technology. Security requirements are met by security measures, which generally consist of several security mechanisms such as cryptographic mechanisms and digital watermarking techniques. In this paper, image authentication between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) watermarking is analyzed in performance comparison. On-line handwritten signature is acquired G-Pen F350 tablet encodes the signature which creates own signature image of different users and is used as watermark. The same digital watermarking embedding and extracting algorithms based on DCT and DWT are discussed and implemented. As in experimental results for the robustness and performance comparison, Peak Signal to Noise Ratio ( PSNR) and Normal Correlation (NC) are estimated from different standard images.
Keywords
Image Authentication
Keywords
cryptographic mechanism
Keywords
digital watermarking
Keywords
DCT
Keywords
DWT
Journal articles
Eleventh International Conference On Computer Applications (ICCA 2013)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:33:58.218669
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL