Results 21 to 30 of about 23,277 (209)

Improved Watermarking Scheme Using Decimal Sequences [PDF]

open access: yes, 2005
This paper presents watermarking algorithms using d-sequences so that the peak signal to noise ratio (PSNR) is maximized and the distortion introduced in the image due to the embedding is minimized. By exploiting the cross correlation property of decimal
Shaik, Ashfaq N
core   +3 more sources

Digital Image Watermarking Techniques: A Review

open access: yesInformation, 2020
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images ...
Mahbuba Begum, Mohammad Shorif Uddin
doaj   +1 more source

Infrared thermograms applied to near-field testing [PDF]

open access: yes, 1999
Electromagnetic fields close to radiant structures can be measured quickly using an infrared camera. Examples of induced fields by wire antennas over a detection screen at distances shorter than one wavelength are presented.
Aguasca Solé, Alberto   +2 more
core   +2 more sources

Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2015
The exponential growth in electronic data over internet have increased the demand of a robust and high quality watermarking method for authentication and copyright protection.
Manish Gupta   +3 more
doaj   +1 more source

A roadside units positioning framework in the context of vehicle-to-infrastructure based on integrated AHP-entropy and group-VIKOR [PDF]

open access: yes, 2021
The positioning of roadside units (RSUs) in a vehicle-to-infrastructure (V2I) communication system may have an impact on network performance. Optimal RSU positioning is required to reduce cost and maintain the quality of service. However, RSU positioning
Malik, Rami Qays
core  

Watermark Faker: Towards Forgery of Digital Image Watermarking [PDF]

open access: yes2021 IEEE International Conference on Multimedia and Expo (ICME), 2021
Digital watermarking has been widely used to protect the copyright and integrity of multimedia data. Previous studies mainly focus on designing watermarking techniques that are robust to attacks of destroying the embedded watermarks. However, the emerging deep learning based image generation technology raises new open issues that whether it is possible
Wang, Ruowei   +3 more
openaire   +2 more sources

A Novel Medical Image Watermarking in Three-dimensional Fourier Compressed Domain [PDF]

open access: yesInternational Journal Bioautomation, 2015
Digital watermarking is a research hotspot in the field of image security, which is protected digital image copyright. In order to ensure medical image information security, a novel medical image digital watermarking algorithm in three-dimensional ...
Baoru Han, Jingbing Li, Mengxing Huang
doaj  

Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform

open access: yesApplied Sciences, 2023
In recent years, digital image watermarking has gained a significant amount of popularity and developed into a crucial and essential tool for copyright protection, security, and the identification of multimedia content.
Musrrat Ali
doaj   +1 more source

Multipurpose zero watermarking algorithm for medical image based on SVD and SAE

open access: yesDianxin kexue, 2017
A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original ...
Jieli SUN   +3 more
doaj   +2 more sources

Digital image watermarking [PDF]

open access: yes, 2004
In recent years, interest in digital watermarking has grown significantly. Indeed, the use of digital watermarking techniques is seen as a promising mean to protect intellectual property rights of digital data and to ensure the authentication of digital data.
  +5 more sources

Home - About - Disclaimer - Privacy