Watermark options

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Watermark Template Attack

This paper presents a new attack, called the watermark template attack, for watermarked images. In contrast to the Stirmark benchmark [1-2], this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches [3-4], it is not the aim of the attack to change the statistics of embedded w...

متن کامل

Watermark Detection: Benchmarking Perspectives

Benchmarking of watermarking algorithms is a complicated task that requires examination of a set of mutually dependent performance factors (algorithm complexity, decoding/detection performance, and perceptual quality). This paper will focus on detection/decoding performance evaluation and try to summarize its basic principles. A methodology for deriving the corresponding performance metrics wil...

متن کامل

A Neural Watermark Approach

In this paper we propose the coupling of a watermarking technique for images, called least significant bit, in the multiple classes random neural network. For that, we design a training process of the watermark pattern, an embedding process of the learned pattern in the original image, and a detecting process of this pattern in the carrier image. The removal of the watermark is not considered i...

متن کامل

The Watermark Copy Attack

Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. ...

متن کامل

Key Independent Watermark Detection

Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data. Legendre sequences are a suitable candidate for signature encryption as they exhibit ‘perfect’ two level auto-correlation. Additionally, Legendre sequences have the unusual and interesting property of invariance under...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Finance and Stochastics

سال: 2016

ISSN: 0949-2984,1432-1122

DOI: 10.1007/s00780-016-0319-x