Results 31 to 40 of about 22,260 (189)

A Novel Medical Image Watermarking in Three-dimensional Fourier Compressed Domain [PDF]

open access: yesInternational Journal Bioautomation, 2015
Digital watermarking is a research hotspot in the field of image security, which is protected digital image copyright. In order to ensure medical image information security, a novel medical image digital watermarking algorithm in three-dimensional ...
Baoru Han, Jingbing Li, Mengxing Huang
doaj  

Digital Watermarking

open access: yesInternational Research Journal of Computer Science, 2023
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection.
Reji Thomas   +3 more
openaire   +1 more source

A constructive and unifying framework for zero-bit watermarking [PDF]

open access: yes, 2006
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this
Furon, Teddy
core   +7 more sources

A NOVEL DIGITAL IMAGE WATERMARKING SCHEME USING BIORTHOGONAL WAVELETS [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2011
Copyright protection is considered as an issue of vital significance owing to the escalating utilization of internet and effortless copying, tampering and distribution of digital images.
G. Yamuna, D. Sivakumar
doaj  

An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in Robustness and Imperceptibility

open access: yesHigh-Confidence Computing, 2023
Watermarking is the advanced technology utilized to secure digital data by integrating ownership or copyright protection. Most of the traditional extracting processes in audio watermarking have some restrictions due to low reliability to various attacks.
Abhijit J. Patil, Ramesh Shelke
doaj   +1 more source

Copyright Protection of Color Imaging Using Robust-Encoded Watermarking [PDF]

open access: yes, 2015
In this paper we present a robust-encoded watermarking method applied to color images for copyright protection, which presents robustness against several geometric and signal processing distortions.
Cedillo-Hernandez, A.   +4 more
core   +2 more sources

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Digital Fresnel hologram watermarking [PDF]

open access: yes2010 9th Euro-American Workshop on Information Optics, 2010
We present a method of digital hologram watermarking using a Fresnel hologram of a real-world 3D object and the fractional Fourier transform. A watermark is encrypted using double random phase fractional Fourier domain encoding technique and then encoded into the digital hologram.
Nishchal, Naveen K.   +2 more
openaire   +2 more sources

Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic

open access: yes, 2010
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying.
Hsieh, Ming-Shing
core   +3 more sources

Secure and Robust Image Watermarking Scheme Using Homomorphic Transform, SVD and Arnold Transform in RDWT Domain [PDF]

open access: yes, 2019
The main objective for a watermarking technique is to attain imperceptibility, robustness and security against various malicious attacks applied by illicit users. To fulfil these basic requirements for a scheme is a big issue of concern.
Khare, Priyank, Srivastava, Vinay Kumar
core   +2 more sources

Home - About - Disclaimer - Privacy