Separable Watermarking Technique Using the Biological Color Model

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separable Watermarking Technique Using the Biological Color Model

Problem statement: The issue of having robust and fragile watermarking is still main focus for various researchers worldwide. Performance of a watermarking technique depends on how complex as well as how feasible to implement. These issues are tested using various kinds of attacks including geometry and transformation. Watermarking techniques in color images are more challenging than gray image...

متن کامل

A New Color Image Watermarking Technique Using Hybrid Domain

Many watermarking techniques have been used for copyright protection of digital images. A color image watermarking technique which is robust and resilient to many types of attack is proposed. This technique involves three stages, viz: preprocessing, embedding and extraction. RGB image is converted to YCbCr to ensure the best imperceptibility and robustness. In spatial domain, the best quadrant ...

متن کامل

A Technique for Digital Color Image Watermarking Using ICA

......................................................................................................... II TIIVISTELMÄ ..................................... ERROR! BOOKMARK NOT DEFINED. TABLE OF CONTENTS ................................................................................... III LIST OF ABBREVIATIONS .............................................................................. V ...

متن کامل

Pioneering the Technique for Invisible Image Watermarking on Color Image

Accessibility and ease of internet, together with availability of relatively inexpensive digital recording and storage devices has created an environment where duplication, unauthenticated use and maldistribution of digital content has become very easy. This also facilitates unauthorized use, misappropriation, misrepresentation. Thus authentication of multimedia contents (such as image, video, ...

متن کامل

the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Science

سال: 2009

ISSN: 1549-3636

DOI: 10.3844/jcssp.2009.579.588