Secure and Robust Image Watermarking Scheme Using Homomorphic Transform, SVD and Arnold Transform in RDWT Domain [PDF]
The main objective for a watermarking technique is to attain imperceptibility, robustness and security against various malicious attacks applied by illicit users. To fulfil these basic requirements for a scheme is a big issue of concern.
Priyank Khare, Vinay Kumar Srivastava
doaj +4 more sources
Scene-based imperceptible-visible watermarking for HDR video content [PDF]
This paper presents the High Dynamic Range - Imperceptible Visible Watermarking for HDR video content (HDR-IVW-V) based on scene detection for robust copyright protection of HDR videos using a visually imperceptible watermarking methodology.
Garcia-Ugalde, F. +2 more
core +1 more source
Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm
Quantum image steganography is one of the important research branches of quantum secure communications. In this paper, a large payload quantum image steganography protocol based on quantum image expansion and the Grover search algorithm is proposed.
Zhiguo Qu +4 more
doaj +1 more source
Copyright Protection of Color Imaging Using Robust-Encoded Watermarking [PDF]
In this paper we present a robust-encoded watermarking method applied to color images for copyright protection, which presents robustness against several geometric and signal processing distortions.
Cedillo-Hernandez, A. +4 more
core +2 more sources
Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks [PDF]
Spiking Neural Networks (SNNs) claim to present many advantages in terms of biological plausibility and energy efficiency compared to standard Deep Neural Networks (DNNs).
Hanif, Muhammad Abdullah +5 more
core +2 more sources
In this article I investigate the choreographic practice and work of Marcelo Evelin as a specifically haptic mode of what Gilles Deleuze and Felix Guattari call becoming-imperceptible. In times where power dynamics become ever more supple and non-localisable, the notion of becoming-imperceptible is an apt conceptual figure in naming both the conditions
openaire +3 more sources
Watermarking for multimedia security using complex wavelets [PDF]
This paper investigates the application of complex wavelet transforms to the field of digital data hiding. Complex wavelets offer improved directional selectivity and shift invariance over their discretely sampled counterparts allowing for better ...
Bouridane, Ahmed +3 more
core +2 more sources
A Novel RDA-Based Network to Conceal Image Data and Prevent Information Leakage
Image data play an important role in our daily lives, and scholars have recently leveraged deep learning to design steganography networks to conceal and protect image data.
Feng Chen +4 more
doaj +1 more source
High capacity steganographic method based upon JPEG [PDF]
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core +1 more source
Rate-Distortion-Preserving Forensic Watermarking Using Quantization Parameter Variation
Watermarking enables the identification of digital pirates that illegally redistribute copyright-protected videos. One of the main challenges is for the watermark to be imperceptible, while not increasing the video bit rate.
Hannes Mareen +5 more
doaj +1 more source

