Mushtaq Ahmad Peer

Work place: University of Kashmir, J&K, India, 190006 and University of Mysore, 570006

E-mail: drpeerma@yahoo.com

Website:

Research Interests: Cellular Automata, Image Processing, Information Security, Application Security

Biography

Prof. (Dr.) M. A. Peer: Has received his Masters and Ph. D in Physics from University of Kashmir, Srinagar with specialization in Cellular Automata. The author worked as Director Computer center university of Kashmir and Head, Department of Computer Science, University of Kashmir. The author has also served as Chairman J & K Board of professional Entrance Examination, Government of J & K. More than 15 research scholars have completed M. Phil and Ph. D under his supervision. He is a member of many research organizations. The author has more than 120 international and national level publications to his credit. The research areas include Cellular Automata, Image Processing, Network Security, and Information Security

Author Articles
A Robust Color Image Watermarking Scheme Using Discrete Wavelet Transformation

By Kaiser J. Giri Mushtaq Ahmad Peer P. Nagabhushan

DOI: https://doi.org/10.5815/ijigsp.2015.01.06, Pub. Date: 8 Dec. 2014

Information hiding in digital media such as audio, video and or images in order to establish the owner rights and to protect the copyrights commonly known as digital watermarking has received considerable attention of researchers over last few decades and lot of work has been done accordingly. A number of schemes and algorithms have been proposed and implemented using different techniques. The effectiveness of the technique depends on the host data values chosen for information hiding and the way watermark is being embedded in them. However, in view of the threats posed by the online pirates, the robustness and the security of the underlying watermarking techniques have always been a major concern of the researchers. This paper presents a secure and robust watermarking technique for color images using Discrete Wavelet Transformation. The results obtained have shown that the technique is robust against various common image processing attacks.

[...] Read more.
Other Articles