Results 21 to 30 of about 23,063 (201)

Digital Image Watermarking Techniques: A Review

open access: yesInformation, 2020
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Spread spectrum-based video watermarking algorithms for copyright protection [PDF]

open access: yes, 2002
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago ...
Serdean, Cristian Vasile
core   +2 more sources

Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2015
The exponential growth in electronic data over internet have increased the demand of a robust and high quality watermarking method for authentication and copyright protection.
Manish Gupta   +3 more
doaj   +1 more source

Copyright Protection of Color Imaging Using Robust-Encoded Watermarking [PDF]

open access: yes, 2015
In this paper we present a robust-encoded watermarking method applied to color images for copyright protection, which presents robustness against several geometric and signal processing distortions.
Cedillo-Hernandez, A.   +4 more
core   +2 more sources

Watermark Faker: Towards Forgery of Digital Image Watermarking [PDF]

open access: yes2021 IEEE International Conference on Multimedia and Expo (ICME), 2021
Digital watermarking has been widely used to protect the copyright and integrity of multimedia data. Previous studies mainly focus on designing watermarking techniques that are robust to attacks of destroying the embedded watermarks. However, the emerging deep learning based image generation technology raises new open issues that whether it is possible
Wang, Ruowei   +3 more
openaire   +2 more sources

A Novel Medical Image Watermarking in Three-dimensional Fourier Compressed Domain [PDF]

open access: yesInternational Journal Bioautomation, 2015
Digital watermarking is a research hotspot in the field of image security, which is protected digital image copyright. In order to ensure medical image information security, a novel medical image digital watermarking algorithm in three-dimensional ...
Baoru Han, Jingbing Li, Mengxing Huang
doaj  

Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images

open access: yesJournal of Intelligent Systems, 2018
In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks.
Sharma Akankasha   +2 more
doaj   +1 more source

Watermarking for multimedia security using complex wavelets [PDF]

open access: yes, 2010
This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better ...
Bouridane, Ahmed   +3 more
core   +2 more sources

Multipurpose zero watermarking algorithm for medical image based on SVD and SAE

open access: yesDianxin kexue, 2017
A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original ...
Jieli SUN   +3 more
doaj   +2 more sources

Digital image watermarking [PDF]

open access: yes, 2004
In recent years, interest in digital watermarking has grown significantly. Indeed, the use of digital watermarking techniques is seen as a promising mean to protect intellectual property rights of digital data and to ensure the authentication of digital data.
  +5 more sources

Home - About - Disclaimer - Privacy