2019
DOI: 10.18280/ts.360305
|View full text |Cite
|
Sign up to set email alerts
|

Image Transformation Technique Using Steganography Methods Using LWT Technique

Abstract: Digital image watermarking is a technique adopted to get rid of the increasing piracies in digital images. Computerized information can be effectively duplicated, altered and falsifications be made by anybody having a PC. Most inclined to such vindictive assaults are the watermarked pictures distributed in the Internet. Advanced Watermarking can be utilized as a device for finding unapproved information reuse and furthermore for copyright security. In the existing method, texturization dependant image watermar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(19 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…In future, they intend to use AI based solution in the smart cities use cases. In [18][19][20][21][22] authors have been proposed image transformation and classification techniques used to classify features of the real time autonomous and electric vehicles images and also provided details about real time datasets.…”
Section: Related Workmentioning
confidence: 99%
“…In future, they intend to use AI based solution in the smart cities use cases. In [18][19][20][21][22] authors have been proposed image transformation and classification techniques used to classify features of the real time autonomous and electric vehicles images and also provided details about real time datasets.…”
Section: Related Workmentioning
confidence: 99%
“…The table below contrasts R, MEA, as well as MSE [16] for crop varieties when using artificial neural systems imperialistic competitive optimization technique and grey wolf optimization method models to examine effectiveness. Deep learing and machine learning algorithms comparison using mean absolute percentage error and finding the best performer algorithm using accuracy measure.…”
Section: Artificial Neural Networkmentioning
confidence: 99%
“…One-veto methodology implies if the score of one pivotal checking thing is underneath the limit, for example Lij is 0, at that point USi is 0. The security perception module at that point shows the security see with realistically approach, for example the strategies of the secure filtering consequence for one client's cloud assets [13].…”
Section: Fig 3 Flow Diagram Of Security Modelmentioning
confidence: 99%