Results 31 to 40 of about 8,449 (218)
High capacity audio watermarking using FFT amplitude interpolation [PDF]
An audio watermarking technique in the frequency domain which takes advantage of interpolation is proposed. Interpolated FFT samples are used to generate imperceptible marks. The experimental results show that the suggested method has very high capacity (
Fallahpour Reza, Mehdi +1 more
core +2 more sources
This paper introduces a novel steganography method of secure communication to mitigate the perceptual degradation associated with the quantization process in JPEG compression, particularly when images are recompressed at standard quality levels by ...
Zainalabideen Abdulsamad +2 more
doaj +1 more source
Biomimetic microelectronics for regenerative neuronal cuff implants [PDF]
Smart biomimetics, a unique class of devices combining the mechanical adaptivity of soft actuators with the imperceptibility of microelectronics, is introduced.
Baunack, Stefan +9 more
core +1 more source
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern.
Mahbuba Begum +6 more
doaj +1 more source
An overview on audio steganography techniques [PDF]
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah +2 more
core
High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images
The rapid development of digital multimedia has resulted in a massive storm of large-scale data. The data compression method reduces data size and lowers transmission costs.
Kurnia Anggriani +3 more
doaj +1 more source
TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks
Most of the data manipulation attacks on deep neural networks (DNNs) during the training stage introduce a perceptible noise that can be catered by preprocessing during inference or can be identified during the validation phase. Therefore, data poisoning
Ahmed, Rehan +4 more
core +1 more source
Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking
Image watermarking technique aims at high imperceptibility of the embedded watermark with minimal distortion in the watermarked images. In frequency-domain, block-based Discrete Cosine Transform (DCT) is a popular method which can be improved by ...
Dhani Ariatmanto, Ferda Ernawan
doaj +1 more source
An Imperceptible Plastic Electronic Wrap [PDF]
Extremely compliant sub-2-μm sensor films enable temperature mapping on complex 3D objects, like integrated circuits on printed circuit boards, food packages, and on human skin. In their stretchable form, these metal films withstand strains up to 275%.
Michael Drack +5 more
openaire +2 more sources
Blind and robust images watermarking based on wavelet and edge insertion
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition.
Karim, Attoumani Mohamed +1 more
core +1 more source

