Results 31 to 40 of about 8,449 (218)

High capacity audio watermarking using FFT amplitude interpolation [PDF]

open access: yes, 2009
An audio watermarking technique in the frequency domain which takes advantage of interpolation is proposed. Interpolated FFT samples are used to generate imperceptible marks. The experimental results show that the suggested method has very high capacity (
Fallahpour Reza, Mehdi   +1 more
core   +2 more sources

Robust Steganography for Online Secure Communication with Binary Text Image in JPEG Compressed Domain

open access: yesProceedings of the International Conference on Applied Innovations in IT
This paper introduces a novel steganography method of secure communication to mitigate the perceptual degradation associated with the quantization process in JPEG compression, particularly when images are recompressed at standard quality levels by ...
Zainalabideen Abdulsamad   +2 more
doaj   +1 more source

Biomimetic microelectronics for regenerative neuronal cuff implants [PDF]

open access: yes, 2015
Smart biomimetics, a unique class of devices combining the mechanical adaptivity of soft actuators with the imperceptibility of microelectronics, is introduced.
Baunack, Stefan   +9 more
core   +1 more source

Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness

open access: yesAlgorithms
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern.
Mahbuba Begum   +6 more
doaj   +1 more source

An overview on audio steganography techniques [PDF]

open access: yes, 2012
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah   +2 more
core  

High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images

open access: yesApplied Sciences, 2023
The rapid development of digital multimedia has resulted in a massive storm of large-scale data. The data compression method reduces data size and lowers transmission costs.
Kurnia Anggriani   +3 more
doaj   +1 more source

TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

open access: yes, 2019
Most of the data manipulation attacks on deep neural networks (DNNs) during the training stage introduce a perceptible noise that can be catered by preprocessing during inference or can be identified during the validation phase. Therefore, data poisoning
Ahmed, Rehan   +4 more
core   +1 more source

Adaptive scaling factors based on the impact of selected DCT coefficients for image watermarking

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Image watermarking technique aims at high imperceptibility of the embedded watermark with minimal distortion in the watermarked images. In frequency-domain, block-based Discrete Cosine Transform (DCT) is a popular method which can be improved by ...
Dhani Ariatmanto, Ferda Ernawan
doaj   +1 more source

An Imperceptible Plastic Electronic Wrap [PDF]

open access: yesAdvanced Materials, 2014
Extremely compliant sub-2-μm sensor films enable temperature mapping on complex 3D objects, like integrated circuits on printed circuit boards, food packages, and on human skin. In their stretchable form, these metal films withstand strains up to 275%.
Michael Drack   +5 more
openaire   +2 more sources

Blind and robust images watermarking based on wavelet and edge insertion

open access: yes, 2013
This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition.
Karim, Attoumani Mohamed   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy