23 Questions 14 Answers 0 Followers
Questions related from Sanjay Kumar
I am looking to encrypt the image using the Quantum Walk concept. Is there any code available for this?
11 November 2022 4,719 1 View
From a security perspective whether the attack model and the threat model are the same or different?
31 July 2022 6,157 2 View
What are the metrics which is used to measure the color constancy?
21 April 2022 8,852 3 View
If LSB technique is combined with any frequency domain (DCT, DWT,SVD etc.) watermarking scheme. Is this technique (DWT-LSB) or(DCT-LSB) etc. can be considered as hybrid domain watermarking? OR...
23 November 2021 7,692 2 View
In statistics, the Bhattacharyya distance measures the similarity of two probability distributions. If two probability distributions are same, then in this case what will be coefficient value.
01 January 2021 4,903 4 View
What is the main reason that most of the researcher uses ACM to encrypt the watermark? There is various other image encryption technique but for watermarking ACM technique is used?
25 December 2020 9,985 1 View
I need the time complexity in form of asymptotic order for different watermarking techniques like LSB, DFT, DCT, DWT, SVD, WHT, etc. I there any paper in which the detailed comparison is carried...
25 September 2020 2,170 2 View
What are the advantages of using multiple Transform based watermarking scheme like DWT-SVD, DWT-DCT, DWT-CT-SVD? Even its computational cost is high.
28 May 2020 5,512 0 View
I want to decompose a grayscale image of 512*512 in 64 nonoverlapping blocks of size 64*64. After that, i want to apply 1 level of DWT on each of 64 blocks. Further need the LL component of each...
21 May 2020 7,240 1 View
What is the optimal value of standard deviation of image? If the Standard deviation of image is high what does it mean. If the standard variance of image is low than what does it means?
26 April 2020 5,968 4 View
I have to calculate the NPCR and UACI of the binary image. How it will be different from grayscale images.
10 April 2020 794 5 View
C = normxcorr2(template,A) is not working.
24 March 2020 8,633 3 View
Apart from extra security, what are the advantages of the non-blind watermarking scheme over blind and semi-blind techniques
13 February 2020 3,073 2 View
Recently, what kind of challenges and limitation are there in watermarking, especially in the development of Database and text watermarking techniques
17 January 2020 4,659 4 View
Maximum of image watermarking scheme has been implemented in DWT domain. In that also watermarking is done in LL Sub band . Why watermarking is not preferred in other sub-band specially in HH...
28 August 2019 4,785 8 View
Maximum of research paper on Dwt Watermarking follows the equation Watermarked=Cover +(alpha * watermark) but few paper uses, Watermarked=(1-alpha)Cover +(alpha * watermark). What is the...
07 August 2019 4,397 4 View
There are lots of watermarking survey based on particular techniques, like reversible, or based on image , or audio only. There is not a single survey paper which deals with audio video image in...
06 April 2019 3,230 1 View
From the profile point of view which paper is having more priority in Paid Scopus Journal or International IEEE/Springier Conference.
17 December 2018 8,435 4 View
Lots of comparison has been done between the stenography and watermarking techniques but , what is the main difference between the lsb based stenography and lsb based watermarking.
06 December 2018 5,372 6 View
I had separated Dicom Images in ROI and RONI, I have to rejoin these two-part back to its original form. Please share Matlab code if available to do so.
01 January 1970 3,925 3 View
I am unable to calculate the Bhattacharya distance between 2 images? The function is given in Matlab but its giving error.
01 January 1970 2,925 3 View
I am looking for the definition of adaptive watermarking. I will be glad if you will recommend some papers where definition of adaptive watermarking is given.
01 January 1970 4,997 1 View
Is a false positive problem in SVD based watermarking scheme can be resolved if we apply svd over the encrypted watermark?
01 January 1970 7,052 0 View