Results 61 to 70 of about 8,449 (218)

Toward Achieving a Trade-Off for SVD-Based Image Watermarking Using Mojette Transform

open access: yesIEEE Access
Imperceptibility and robustness are a part of trade-off components in image watermarking schemes and become one of the most studied in this field. Increasing imperceptibility usually will reduce the robustness, conversely, increasing the robustness may ...
Aris Marjuni   +4 more
doaj   +1 more source

Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT)

open access: yesApplied Computing and Informatics, 2019
Text-images still have a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text-images.
Reem A. Alotaibi, Lamiaa A. Elrefaei
doaj   +1 more source

GA Based Robust Blind Digital Watermarking [PDF]

open access: yes, 2018
A genetic algorithm based robust blind digital watermarking scheme is presented. The experimental results show that our scheme keeps invisibility, security and robustness more likely than other proposals in the literature, thanks to the GA pretreatment.
Armario Sampalo, José Andrés   +6 more
core  

A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems

open access: yesIEEE Access, 2020
Massive advances in internet infrastructure are impacting e-healthcare services compared to conventional means. Therefore, extra care and protection is needed for extremely confidential patient medical records.
Ghazanfar Farooq Siddiqui   +6 more
doaj   +1 more source

Lost in Space? “Invisible” Marks, Artworks, and Artists

open access: yesRevistArquis, 2013
This paper addresses the issue of invisibility as relating to visual art through a discussion of my practical and theoretical research. Visual art addresses, at least partly, our sense of visual perception.
Marina Kassianidou
doaj  

Why Should Adversarial Perturbations be Imperceptible? Rethink the Research Paradigm in Adversarial NLP [PDF]

open access: green, 2022
Yang‐Yi Chen   +6 more
openalex   +1 more source

Optimizing Image Watermarking with Dual-Tree Complex Wavelet Transform and Particle Swarm Intelligence for Secure and High-Quality Protection

open access: yesApplied Sciences
Watermarking is a technique used to address issues related to the widespread use of the internet, such as copyright protection, tamper localization, and authentication.
Abed Al Raoof Bsoul, Alaa Bani Ismail
doaj   +1 more source

Feature Image Watermarking Based on Bicubic Interpolation of Wavelet Coefficients Using CRT

open access: yesCommIT Journal, 2017
The main objective of watermarking method is to improve the robustness and imperceptibility. This paper introduces an improved CRT watermarking method using absolute value of interpolated wavelet coefficients aiming to improve the imperceptibility and ...
Prajanto Wahyu Adi   +2 more
doaj   +1 more source

Hughlings Jackson's "imperception" and anosognosia [PDF]

open access: yesJournal of Neurology, Neurosurgery & Psychiatry, 2002
One of the earliest to attempts to localise specific functions to anatomical regions of the brain was that of Franz Joseph Gall,1 who distinguished six varieties of memory, which he localised in the frontal lobes. Auburtin in 1864 related the faculty of language to the frontal lobes, and Broca2 and Dax highlighted the left side of the brain.3 The right
openaire   +2 more sources

Home - About - Disclaimer - Privacy