High image quality watermarking model by using genetic algorithm
Imperceptibility or quality for digital image watermarking represents one of the most important requirements for any digital watermarking system. Many studies try to enhance the quality by using different techniques and methods. In this study, Genetic Algorithm (GA) method is used to embed two bits...
| Main Authors: | Mohammed, Ghassan N., Yasin, Azman, Zeki, Akram M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/30809/ http://irep.iium.edu.my/30809/1/06516339.pdf |
Similar Items
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
A novel clustering based genetic algorithm for route optimization
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
by: Aibinu, Abiodun Musa, et al.
Published: (2016)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Statistical techniques to serve quality of software
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
MR image reconstruction with autoregressive moving average
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2007)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2007)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Implementation of direction control algorithms for fixed wings UAV
by: Abdalla, Mohamed K., et al.
Published: (2015)
by: Abdalla, Mohamed K., et al.
Published: (2015)
Competitive algorithms for online conversion problems with interrelated prices
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Differential image compression for telemedicine: a novel approach
by: Khan, Adnan Alam, et al.
Published: (2011)
by: Khan, Adnan Alam, et al.
Published: (2011)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Performance analysis of machine learning algorithms for missing value imputation
by: Zainal Abidin, Nadzurah, et al.
Published: (2018)
by: Zainal Abidin, Nadzurah, et al.
Published: (2018)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
3D imaging techniques in documentation of cultural assets in Malaysia
by: Md. Sharif, Harlina, et al.
Published: (2015)
by: Md. Sharif, Harlina, et al.
Published: (2015)
Increasing the runs in compressed data using a dedicated move to front algorithm
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
by: Al-Khayyat, Kamal A., et al.
Published: (2019)
Thermal imaging-based human emotion detection: GLCM feature extraction approach
by: Md Yusof, Hazlina
Published: (2015)
by: Md Yusof, Hazlina
Published: (2015)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
A model for real-time recognition and textual representation of Malaysian sign language through image processing
by: Karabasi, Mostafa, et al.
Published: (2013)
by: Karabasi, Mostafa, et al.
Published: (2013)
Highly efficient short length Bismuth-based erbium-doped fiber amplifier
by: Cheng, X.S., et al.
Published: (2011)
by: Cheng, X.S., et al.
Published: (2011)
Measuring the impact of service quality in telecommunication services of Pakistan: a conceptual framework
by: Rind, M. Malook, et al.
Published: (2015)
by: Rind, M. Malook, et al.
Published: (2015)
Interactive multi-media applications: quality of service
guaranteed under huge traffic
by: Yalli, Jameel, et al.
Published: (2014)
by: Yalli, Jameel, et al.
Published: (2014)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Similar Items
-
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012) -
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011) -
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011) -
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011) -
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)