نتایج جستجو برای: watermarking

تعداد نتایج: 6727  

Journal: :international journal of communications and information technology 2011
j. ayubi f. mohanna s. mohanna m. rezaei

a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

2016
Sanjeet Kumar Sanjeev Sanjeev Indora

Digital watermarking is a technique for embedding information in to cover media to prove ownership. It became very important in the number of application areas such as copyright protection, fingerprinting, broadcast monitoring, and medical application. During the last several years, various watermarking techniques have been proposed by different authors. Wavelet based watermarking is gaining mo...

2016
Fang Yinglan Tian Lin

Digital image watermark has been studied as object. It analyzed the typical digital watermark algorithms based on the space domain and transform domain and key researched watermarking algorithm based on discrete wavelet transform. It has designed and improved blind watermarking algorithm and color image watermarking algorithm. Finally, based on the two improved watermarking algorithm, it has de...

2013
Jennifer Ranjani

Watermarking is closely related to steganography but in watermarking the hidden data is usually related to cover image. In this paper discussed about algorithms for rotation, scaling and translation (RST) invariant image watermarking. There are mainly two categories of RST invariant image watermarking algorithms. Then, we discuss about various algorithm used for RST invariant image watermarking.

Journal: :isecure, the isc international journal of information security 0
n. zarmehi electrical engineering department, sharif university of technology, tehran, iran advanced communications research institute, sharif university of technology, tehran, iran m. r. aref electrical engineering department, sharif university of technology, tehran, iran information systems and security lab. (issl), electrical engineering department, sharif university of technology, tehran, iran

this paper investigates the multiplicative spread spectrum watermarking method for the image. the information bit is spreaded into middle-frequency discrete cosine transform (dct) coefficients of each block of an image using a generated pseudo-random sequence. unlike the conventional signal modeling, we suppose that both signal and noise are distributed with laplacian distribution, because the ...

Journal: :Inf. Sci. 2014
Asifullah Khan Ayesha Siddiqa Summuyya Munib Sana Ambreen Malik

 1 Abstract— The art of secretly hiding and communicating information has gained immense importance in the last 2 two decades due to the advances in generation, storage, and communication technology of digital content. 3 Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, 4 watermarking can cause damage to the sensitive information pr...

2009
Xi Zhao Steve Schneider

......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...

Journal: :IEEE Trans. Multimedia 2002
Ruizhen Liu Tieniu Tan

Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. There are two important issues that watermarking algorithms need to address. Firstly, watermarking schemes are required to provide trustworthy evidence for protecting rightful ownership; Secondly, good watermarking schemes should satisfy the requirement ...

2016
Mehdi Khalili Mahsa Nazari

There are two digital watermarking techniques. Digital watermarking techniques based on correlation and digital watermarking techniques that are not based on correlation. In previous work, we proposed a DWT2 based CDMA image watermarking scheme to study the effects of using eight color spaces RGB, YCbCr, JPEG-YCbCr, YIQ, YUV, HSI, HSV and CIELab, on watermarking algorithms based on correlation ...

The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید