Results 21 to 30 of about 22,932 (201)

Digital Image Watermarking Techniques: A Review

open access: yesInformation, 2020
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

A roadside units positioning framework in the context of vehicle-to-infrastructure based on integrated AHP-entropy and group-VIKOR [PDF]

open access: yes, 2021
The positioning of roadside units (RSUs) in a vehicle-to-infrastructure (V2I) communication system may have an impact on network performance. Optimal RSU positioning is required to reduce cost and maintain the quality of service. However, RSU positioning
Malik, Rami Qays
core  

Copyright Protection of Color Imaging Using Robust-Encoded Watermarking [PDF]

open access: yes, 2015
In this paper we present a robust-encoded watermarking method applied to color images for copyright protection, which presents robustness against several geometric and signal processing distortions.
Cedillo-Hernandez, A.   +4 more
core   +2 more sources

Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2015
The exponential growth in electronic data over internet have increased the demand of a robust and high quality watermarking method for authentication and copyright protection.
Manish Gupta   +3 more
doaj   +1 more source

Watermark Faker: Towards Forgery of Digital Image Watermarking [PDF]

open access: yes2021 IEEE International Conference on Multimedia and Expo (ICME), 2021
Digital watermarking has been widely used to protect the copyright and integrity of multimedia data. Previous studies mainly focus on designing watermarking techniques that are robust to attacks of destroying the embedded watermarks. However, the emerging deep learning based image generation technology raises new open issues that whether it is possible
Wang, Ruowei   +3 more
openaire   +2 more sources

A Novel Medical Image Watermarking in Three-dimensional Fourier Compressed Domain [PDF]

open access: yesInternational Journal Bioautomation, 2015
Digital watermarking is a research hotspot in the field of image security, which is protected digital image copyright. In order to ensure medical image information security, a novel medical image digital watermarking algorithm in three-dimensional ...
Baoru Han, Jingbing Li, Mengxing Huang
doaj  

Combining Haar Wavelet and Karhunen-Loeve Transform for Robust and Imperceptible Data Hiding Using Digital Images

open access: yesJournal of Intelligent Systems, 2018
In this paper, we present an introduction of digital image watermarking followed by important characteristics and potential applications of digital watermarks.
Sharma Akankasha   +2 more
doaj   +1 more source

Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform

open access: yesApplied Sciences, 2023
In recent years, digital image watermarking has gained a significant amount of popularity and developed into a crucial and essential tool for copyright protection, security, and the identification of multimedia content.
Musrrat Ali
doaj   +1 more source

A novel semi-fragile forensic watermarking scheme for remote sensing images [PDF]

open access: yes, 2011
Peer-reviewedA semi-fragile watermarking scheme for multiple band images is presented. We propose to embed a mark into remote sensing images applying a tree structured vector quantization approach to the pixel signatures, instead of processing each band ...
Aiazzi B.   +24 more
core   +1 more source

Multipurpose zero watermarking algorithm for medical image based on SVD and SAE

open access: yesDianxin kexue, 2017
A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original ...
Jieli SUN   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy