Future of Information and Communication Conference (FICC) 2024
4-5 April 2024
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 5 Issue 6, 2014.
Abstract: Watermark is used to protect copyright and to authenticate images. In digital media, today’s world images are in electronic form available in the internet. For its protection and authentication invisible watermarking in encrypted form are used. In this paper encryption is done using fuzzy Compliment-Max-Product matrix and then encrypted watermark is embedded in the digital media at desired places using fuzzy rule. The Region of Interest (ROI) is decided with fuzzification. Then, watermark is inserted at the respective positions in the image. Robustness of watermark is judged for ROI. This method of watermarking is done on all image file formats and it is resistant for geometric, noise and compression attack.
Sharbani Bhattacharya, “Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking” International Journal of Advanced Computer Science and Applications(IJACSA), 5(6), 2014. http://dx.doi.org/10.14569/IJACSA.2014.050620
@article{Bhattacharya2014,
title = {Encrypted With Fuzzy Compliment-Max-Product Matrix in Watermarking},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2014.050620},
url = {http://dx.doi.org/10.14569/IJACSA.2014.050620},
year = {2014},
publisher = {The Science and Information Organization},
volume = {5},
number = {6},
author = {Sharbani Bhattacharya}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.