Implementation of Invisible Digital Watermarking on Image using Permutation of Key and Image Shares

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Digital Image Watermarking Scheme Based on DWT

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

متن کامل

A Robust Digital Image Watermarking Scheme Based on DWT

In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...

متن کامل

FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder

Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. While encryption transforms original multimedia object into another form, digital watermarking leaves the original object intact and recognizable. The objective is to develop low power, real time, reliable and secure watermarkin...

متن کامل

Pioneering the Technique for Invisible Image Watermarking on Color Image

Accessibility and ease of internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment where duplication, unauthenticated use and maldistribution of digital content has become very easy. This also facilitates unauthorized use, misappropriation, misrepresentation. Thus authentication of multimedia contents (such as image, video, ...

متن کامل

on translation of politeness strategies in dialogues involving female characters in translations and retranslations of novels translated before and after the islamic revolution of iran and their effects on the image of women: a polysystem theory approach

abstract reception environment has considerable effects on accepting a translation. as the expectations of a target culture and its values and needs change throughout history, its criteria for accepting a translation or rejecting it will change accordingly (gentzler, 2001). the expectations of iran, as the reception environment in the present study, have changed after the islamic revolution. i...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer and Communication Technology

سال: 2012

ISSN: 2231-0371,0975-7449

DOI: 10.47893/ijcct.2012.1117