Results 11 to 20 of about 8,449 (218)

Secure and Robust Image Watermarking Scheme Using Homomorphic Transform, SVD and Arnold Transform in RDWT Domain [PDF]

open access: yesAdvances in Electrical and Electronic Engineering, 2019
The main objective for a watermarking technique is to attain imperceptibility, robustness and security against various malicious attacks applied by illicit users. To fulfil these basic requirements for a scheme is a big issue of concern.
Priyank Khare, Vinay Kumar Srivastava
doaj   +4 more sources

Scene-based imperceptible-visible watermarking for HDR video content [PDF]

open access: yes, 2019
This paper presents the High Dynamic Range - Imperceptible Visible Watermarking for HDR video content (HDR-IVW-V) based on scene detection for robust copyright protection of HDR videos using a visually imperceptible watermarking methodology.
Garcia-Ugalde, F.   +2 more
core   +1 more source

Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm

open access: yesIEEE Access, 2019
Quantum image steganography is one of the important research branches of quantum secure communications. In this paper, a large payload quantum image steganography protocol based on quantum image expansion and the Grover search algorithm is proposed.
Zhiguo Qu   +4 more
doaj   +1 more source

Copyright Protection of Color Imaging Using Robust-Encoded Watermarking [PDF]

open access: yes, 2015
In this paper we present a robust-encoded watermarking method applied to color images for copyright protection, which presents robustness against several geometric and signal processing distortions.
Cedillo-Hernandez, A.   +4 more
core   +2 more sources

Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks [PDF]

open access: yes, 2020
Spiking Neural Networks (SNNs) claim to present many advantages in terms of biological plausibility and energy efficiency compared to standard Deep Neural Networks (DNNs).
Hanif, Muhammad Abdullah   +5 more
core   +2 more sources

Imperceptible Bodies

open access: yesPerformance Philosophy, 2022
In this article I investigate the choreographic practice and work of Marcelo Evelin as a specifically haptic mode of what Gilles Deleuze and Felix Guattari call becoming-imperceptible. In times where power dynamics become ever more supple and non-localisable, the notion of becoming-imperceptible is an apt conceptual figure in naming both the conditions
openaire   +3 more sources

Watermarking for multimedia security using complex wavelets [PDF]

open access: yes, 2010
This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better ...
Bouridane, Ahmed   +3 more
core   +2 more sources

A Novel RDA-Based Network to Conceal Image Data and Prevent Information Leakage

open access: yesMathematics, 2022
Image data play an important role in our daily lives, and scholars have recently leveraged deep learning to design steganography networks to conceal and protect image data.
Feng Chen   +4 more
doaj   +1 more source

High capacity steganographic method based upon JPEG [PDF]

open access: yes, 2008
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Rate-Distortion-Preserving Forensic Watermarking Using Quantization Parameter Variation

open access: yesIEEE Access, 2020
Watermarking enables the identification of digital pirates that illegally redistribute copyright-protected videos. One of the main challenges is for the watermark to be imperceptible, while not increasing the video bit rate.
Hannes Mareen   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy