VNAWAZ MOHAMUDALLY
Published In: 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, CONTROL AND NETWORKING
Author(s): M. KALEEM GALAMALI , NAWAZ MOHAMUDALLY
Abstract: Location-Tracking and correspondingly applications on it along with new functionalities are being developed in the field of ubicomp [30-66]. MANET transmission strategies are also subject to research. An area missing in the field of ubicomp is the software engineering approaches of metric development, analysis and modelling for predictability purposes and better gearing of future research investments. The particular area of concern here is energy considerations in ubicomp. A previous research [14] was carried out to assess how much energy savings can be achieved by a sender node in location-aware MANET transmission and the corresponding model was put forward as exponential. In this paper, the next set of question investigated is legitimately put forward as: “What are the trends of variation observable within each parameter of the exponential equation obtained for metric SES [14] over varying node densities?” The need for studying the behaviour of components of an applicable model and s
- Publication Date: 26-Feb-2017
- DOI: 10.15224/978-1-63248-117-7-08
- Views: 0
- Downloads: 0
ROBUST DIGITAL WATERMARKING TECHNIQUES BASED ON DCT AND DWT ALGORITHMS.
Published In: 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, CONTROL AND NETWORKING
Author(s): MOHAMMED A. AL- JARRAH
Abstract: copyright protection of digital media has become a major concern for owners of digital media such as images, videos, and audios. Digital watermarking is a process of hiding an image or text on an image to provide evidence of its authenticity. In this paper, we developed five different methods. We considered the transform of an image using DCT, DWT and DCT with DWT formats could affect the hidden watermark in a way or another. In addition, we considered adding additional attacks like crop image, salt and pepper noise, Gaussian noise and filter. The schemes we are providing here are resilient to these types of attacks and is novel in this scenario.
- Publication Date: 26-Feb-2017
- DOI: 10.15224/978-1-63248-117-7-09
- Views: 0
- Downloads: 0