Loading

To Design and Develop the Real-Time Watermarking Scheme which could be used in IPTV Applications
A.Madhuri1, Vasudeva Reddy Nandigama2, S.V.S Prasad3

1A. Madhuri*, PG Student, Department of Electronics and Communication Engineering, MLR Institute of Technology, Hyderabad, Telangana, India.
2Vasudeva Reddy Nandigama, Associate Professor, Department of Electronics and Communication Engineering, MLR Institute of Technology, Hyderabad, Telangana, India.
3Dr. S.V.S Prasad, Head of Department and Professor, Department of Electronics and Communication Engineering, MLR Institute of Technology, Hyderabad, Telangana, India.
Manuscript received on January 12, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on February 10, 2020. | PP: 3238-3241 | Volume-9 Issue-4, February 2020. | Retrieval Number: D1950029420/2020©BEIESP | DOI: 10.35940/ijitee.D1950.029420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: IIn view that the utilization digital strategies for sending and storing pix are establishing; it is far changing into an indispensable most vital assignment a method to protect the confidentiality, integrity and believability of pictures. This valuate paper extends to the power parameters used in cryptography strategies and learning on their take care of problems that had been developed and are in acknowledge in as lots as a result of the second instances. 
Keywords: Confidentiality, Integrity, Pictures, Power Parameters, Cryptography.
Scope of the Article: Cryptography and Applied Mathematics