Heritage incorporates images, customs, rituals, beliefs, cultures, knowledge, arts, crafts, music, and artifacts of a region. Apart from conferring the details about the understanding of previous generations, the heri...
详细信息
Heritage incorporates images, customs, rituals, beliefs, cultures, knowledge, arts, crafts, music, and artifacts of a region. Apart from conferring the details about the understanding of previous generations, the heritage multimedia also provides details regarding innovative attitudes, ways of living, and heterogeneity of historical and archaeological approaches of a society. Since the availability of the internet in the present scenario makes an illicit user access the data easily, therefore, it is mandatory to protect the Cultural Heritage (CH) media. This paper offers a secure and resilient Discrete Cosine Transform (DCT) based blind watermarking algorithm for copyright security of digital images. We have developed and tested two different approaches of embedding namely Fixed Threshold Reference-based Relative Modulation (FTRRM) and Adaptive Threshold Reference-based Relative Modulation (ATRRM). In either approach, the watermark is embedded in the ‘Y’ component of the YCbCr color model. In FTRRM, the ‘Y’ component of the host image is first divided into 8 × 8 non-overlapping blocks and DCT is applied on each block. The watermark bits are embedded into the transformed coefficients by modulating the relative difference of coefficients depending on the bit to be embedded. A similar embedding strategy is followed in ATRRM, with a change that relative difference is modulated adaptively. Both schemes have been tested on a set of heritage images, besides general test images. We make use of chaotic and Deoxyribo Nucleic acid (DNA) encryption to ensure double-layer security of embedded watermark. The Peak Signal-to-Noise Ratio (PSNR) of the proposed scheme in the case of FTRRM is 40.4984 dB and for ATRRM it is 39.9549 dB, the Structural Similarity Index Matrix (SSIM) values are close to unity, in both cases for various test images that guarantee the imperceptibility of the proposed scheme. The robustness of each scheme is revealed by comparing them with the various state-
Superpixel segmentation is a commonly used computer vision image segmentation method that aims to cluster similar pixels in an image into larger, more meaningful regions. Traditional superpixel segmentation algorithms...
详细信息
Chronic renal disease is the term used to describe kidney function that gradually declines. The kidneys’ final byproduct of eliminating waste and surplus fluid from the bloodstream is urine. Abnormal accumulations of...
详细信息
This paper proposes a hierarchical path-planning algorithm based on a combination of graphical search algorithms and optimization methods. In the global path planning layer, by using the Hybrid A∗ algorithm, we can qu...
详细信息
Wireless sensor networks (WSNs) have found extensive applications across various fields, significantly enhancing the convenience in our daily lives. Hence, an in-creasing number of researchers are directing their atte...
详细信息
Superpixel is an image preprocessing technique that combines adjacent pixels in an image to form smaller connected regions. It serves as the smallest unit for subsequent image-processing tasks. Reduced computational c...
详细信息
The cross-modal molecule retrieval (Text2Mol) task aims to bridge the semantic gap between molecules and natural language descriptions. A solution to this nontrivial problem relies on a graph convolutional network (GC...
详细信息
The rapid expansion of cloud computing e-learning systems has empowered educators to reach learners worldwide. However, a critical study gap exists: the impact of lecturers’ technological anxiety on their adoption in...
详细信息
This paper presents a solution to the challenges in agriculture by designing a machine learning based farm interaction system that can accurately detect the maturity of farm produce in real-Time and remotely control t...
详细信息
Due to the constraints on power supply and limited encryption capability, data security based on physical layer security (PLS) techniques in backscatter communications has attracted a lot of attention. In this work, w...
详细信息
暂无评论