منابع مشابه
Watermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملImage Watermarking System Based on Centroid Projection
We propose an image watermarking system aiming at reducing false positive rate based on the location changes of centroids of several selected points. Two secret keys are used to determine the number of selected points and the random number seed in the LL band of DWT domain, respectively, of the o r i g i ~ l and watermarked images. The number of modified pixel values is basically a tradeoff bet...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملA Web Oriented Watermarking Protocol
This paper presents a watermarking protocol able to solve the well-known “customer’s right problem” and “unbinding problem”. In particular, the protocol has been purposely designed to be adopted in a web context, where users wanting to buy digital contents are usually neither provided with digital certificates issued by certification authorities (CAs) nor able to autonomously perform specific s...
متن کاملWeb Based Security System
Security systems play an important role in the protection of lives and investment. The aim of this project is to design an efficient and cheap security system, which is accessible from any part of the world through the internet, and can be employed in every facet of the economy. This is achieved by incorporating various subsystems (such as surveillance, intruder control, access control, fire de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Informatica Malaysia
سال: 2017
ISSN: 2521-0874,2521-0505
DOI: 10.26480/aim.01.2017.12.16