Learn More
The purpose of this paper is to introduce and study the concepts of intuitionistic fuzzy weakly generalized closed set and intuitionistic fuzzy weakly generalized open set in intuitionistic fuzzy topological space. We investigate some of their properties. Also we study the application of intuitionistic fuzzy weakly generalized closed set namely(More)
Aliquot watermarking is the unique idea in aliquot media for copyright protection. Various watermarking algorithm has been developed in recent years, but cognitive content of the intent, as they serve, they demarcated from each other. This context presents a new proposal for hiding a logo-based watermark in color still image. This dodge is based on(More)
Various watermarking algorithm has been developed in recent years. The two-dimension DCT and its counterpart Inverse 2-D DCT, are the most complex parts in the DCT-based watermarking systems. In this paper, the watermark to be inserted in the cover image is encrypted through a proposed encryption strategy to enhance the overall security instead of embedding(More)
With the rapid development and wide use of Internet, information transmission faces a big challenge of security. People need a safe and secured way to transmit information. Encryption is a common method, which is used for encrypting information. But it is easier to attract the attention of the attackers because the information cannot be read directly. The(More)
Tuberculosis is one of the most devastating bacterial diseases, with increasing rates of morbidity and mortality, despite the presence of effective chemotherapy and Bacillus-Calmette-Guerin (BCG) vaccine. The success of Mycobacterium tuberculosis lies in its ability to spread by aerosol droplets, evade the host immune system and to persist in pulmonary(More)
  • Ajit Preeti Kalra, Sonia Dhull, +10 authors Vijay Laxmi
  • 2016
In this paper the concept of Image Steganography is tested for Watermarking algorithms. Least Significant Bit (LSB) based spatial domain technique and Mid band Discrete Cosine Transform (DCT) domain techniques are compared. After computing the results using coefficient DCT Mid band watermarking algorithm is more secure than LSB.