<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Community:</title>
  <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/230" />
  <subtitle />
  <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/230</id>
  <updated>2026-04-27T18:44:28Z</updated>
  <dc:date>2026-04-27T18:44:28Z</dc:date>
  <entry>
    <title>Image And Video Watermarking: Machine Learning And Frequency Domain Approach For Achieving Dual Security Of Important Information</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2293" />
    <author>
      <name>Pithiya, Kiran Ashok</name>
    </author>
    <author>
      <name>Kothari, Ashish M.</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2293</id>
    <updated>2025-01-28T10:10:19Z</updated>
    <published>2024-12-01T00:00:00Z</published>
    <summary type="text">Title: Image And Video Watermarking: Machine Learning And Frequency Domain Approach For Achieving Dual Security Of Important Information
Authors: Pithiya, Kiran Ashok; Kothari, Ashish M.
Abstract: Digital watermarking is a technique used to embed a hidden message, such as a company logo,&#xD;
creator’s name, or other identifying information, into a cover medium like images, audio, or&#xD;
video. Effective digital watermarking algorithms must satisfy three key requirements:&#xD;
robustness, perceptibility, and payload capacity. These algorithms are categorized into two&#xD;
primary domains: spatial and transform. In the spatial domain, watermarking modifies pixel&#xD;
values directly based on the watermark. In the transform domain, the frequency components&#xD;
of the cover medium are manipulated to embed the watermark. Lastly, a hybrid approach&#xD;
combines DCT, DWT, and SVD techniques to leverage the strengths of all three methods,&#xD;
achieving improved performance.&#xD;
To evaluate watermarking effectiveness, two metrics are calculated: (1) Perceptibility: This is&#xD;
assessed using Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE) at the&#xD;
transmitter end. (2) The quality of the recovered watermark at the receiver side is determined&#xD;
by calculating the correlation between the recovered and original watermarks.&#xD;
For assessing robustness, which measures the quality of the watermark retrieved at the receiver&#xD;
side, the correlation between the recovered watermark and the original message is calculated.&#xD;
A higher correlation indicates stronger robustness, ensuring the watermark remains intact even&#xD;
under various attacks or distortions.&#xD;
This thesis introduces a novel method for embedding watermark messages into the crucial part&#xD;
of an image, specifically the region of interest (ROI). The focus is on identifying the human&#xD;
face within an image and embedding the watermark within this detected face. Once the&#xD;
watermark is embedded, the altered face image is reinserted back into the original image. To&#xD;
achieve this, the method employs a face identification algorithm alongside two frequency&#xD;
domain transforms viz. Discrete Cosine and Wavelet as well as the powerful linear algebra&#xD;
technique known as Singular Value Decomposition (SVD). Additionally, the thesis utilizes&#xD;
three widely recognized visual quality metrics to evaluate the method’s effectiveness. At the&#xD;
transmitter side, Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used&#xD;
to assess the perceptual quality of the image after watermark embedding. At the receiver side,&#xD;
Correlation is measured to test the robustness of the algorithm.&#xD;
Finally A hybrid algorithm is introduced, which integrates Discrete Cosine Transform (DCT),&#xD;
Discrete Wavelet Transform (DWT), and Singular Value Decomposition (SVD). This&#xD;
combination harnesses the advantages of all three methods, enhancing the overall performance&#xD;
of the watermarking process.&#xD;
Experimental results demonstrate that the hybrid algorithm outperforms individual methods&#xD;
(DCT, DWT, or SVD alone) in both perceptibility and robustness. This makes the proposed&#xD;
approach a superior choice for applications requiring reliable and imperceptible digital&#xD;
watermarking.</summary>
    <dc:date>2024-12-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A Survey on Latest Wireless Technologies</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2283" />
    <author>
      <name>Mewada, K.M.</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2283</id>
    <updated>2025-01-06T09:36:03Z</updated>
    <published>2016-02-01T00:00:00Z</published>
    <summary type="text">Title: A Survey on Latest Wireless Technologies
Authors: Mewada, K.M.
Abstract: Wireless communication is among technology’s biggest contributions to mankind. Wireless communication&#xD;
involves the transmission of information over a distance without the help of wires, cables, or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and thousands of kilometers (for example, radio communication). It is used as an advantage for working professionals in remote areas to remain in touch with their main headquarters. Moreover, it is wireless so it can be easily accessible without cables and wires. It is cheaper to install and maintain.</summary>
    <dc:date>2016-02-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A hybrid watermarking scheme with CS theory for security of multimedia data</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2263" />
    <author>
      <name>Thank, Rohit</name>
    </author>
    <author>
      <name>Dwivedi, Vedvyas</name>
    </author>
    <author>
      <name>Borisagar, Komal</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2263</id>
    <updated>2025-01-02T07:14:45Z</updated>
    <published>2019-10-01T00:00:00Z</published>
    <summary type="text">Title: A hybrid watermarking scheme with CS theory for security of multimedia data
Authors: Thank, Rohit; Dwivedi, Vedvyas; Borisagar, Komal
Abstract: A hybrid watermarking scheme for multimedia data such as digital image, digital video is proposed in this paper. The scheme utilizes various image processing transforms and Compressive Sensing (CS) to achieved fragility and security for multimedia data. The compressive sensing is applied on the singular value of wavelet coefficients of watermark image to get the CS measurements. These CS measurements are embedded with embedding factor into the hybrid coefficients (high frequency curvelet coefficients of DT coefficients) of the host medium. In the proposed scheme, host medium may be digital image or video. The generated watermarked data have different security layers such as four levels from CS such as knowledge of transform basis matrix, measurement matrix, orthogonal matrices, information of wavelet basis matrix and one level from watermarking such as embedding factor. The scheme offers fragility and security to multimedia data against various standard watermarking attacks such as signal processing attacks, geometric attacks, and compression attacks. This scheme can be provided high payload capacity and used for host multimedia authentication. A comparison of proposed scheme with existed schemes shows that the proposed scheme performed faster and better than existed schemes available in the literature.</summary>
    <dc:date>2019-10-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2262" />
    <author>
      <name>Borisagar, Komal</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2262</id>
    <updated>2025-01-02T07:14:18Z</updated>
    <published>2019-04-01T00:00:00Z</published>
    <summary type="text">Title: Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing
Authors: Borisagar, Komal
Abstract: Rapid growth in digitization and globalization has influenced the medical field immensely. The radiological pictures are frequently shared comprehensively among specialists, medicinal experts, radiologists, analysts, and patients themselves by means of wired or remote media for purposes, for example, common accessibility and enhancing the diagnostic results. This paper proposes a hybrid and high capacity image hiding technique for secure transmission and integrity of color radiological images. The Compressive Sensing (CS) theory is used to encrypt the color secret image before embedding them into high frequency Fast Discrete Curvelet Transform (FDCuT) coefficients of color radiological images. The simulations gave a PSNR of 63.96 dB, which demonstrates better performance in terms of imperceptibility of stego color radiological image. Further, expansive payload limit is permitted when contrasted with many existing strategies.</summary>
    <dc:date>2019-04-01T00:00:00Z</dc:date>
  </entry>
</feed>

