Results 1 to 10 of about 42,016 (177)
A unified framework for robust 3D watermarking based on feature integration [PDF]
In this paper, we present a unified framework for robust 3D embedded watermarking and non-embedded watermarking based on feature integration. It begins by segmenting a 3D model into multiple separate sub-models via empirical mode decomposition (EMD). And
Jianping Hu +4 more
doaj +2 more sources
Reversible Watermarking for Electrocardiogram Protection [PDF]
The electrocardiogram (ECG) is one of the widespread diagnostic methods used in telemedicine. However, in the telemedicine systems, the data transfer process to the end user may suffer from security risks.
Pavel Andreev +2 more
doaj +2 more sources
Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [PDF]
Most of the existing watermarking and encryption schemes are difficult to ensure the commutativity of watermarking and encryption as well as the visual quality of the protected image.These schemes complete watermark embedding and image encryption ...
REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong
doaj +1 more source
A Novel Hybrid Reversible-Zero Watermarking Scheme to Protect Medical Image
The verification of copyright and authenticity for medical images is critical in telemedical applications. Watermarking is a key technique for protecting medical images and can be mainly divided into three categories: region of interest (ROI) lossless ...
Zhen Dai +4 more
doaj +1 more source
Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps
Zero watermarking does not alter the original information contained in vector map data and provides perfect imperceptibility. The use of zero watermarking for data copyright protection has become a significant trend in digital watermarking research ...
Na Ren +4 more
doaj +1 more source
FPGA Implementation of Image Watermarking Process using Xilinx System Generator [PDF]
Watermarking is a tool of confidentiality that protects valuable information hidden in the set of digital media by modifying the particular graphic contents. Special purpose hardware designed systems can be mapped in watermarking through FPGA.
Sharma Chandani +2 more
doaj +1 more source
Finance and Stochastics, to ...
Rodosthenous, Neofytos, Zervos, Mihail
openaire +5 more sources
Toward Practical Deep Blind Watermarking for Traitor Tracing
Traitor tracing via blind watermarking is a promising solution to protect copyright. Recently, it was demonstrated that deep learning-based blind watermarking methods could outperform traditional watermarking methods in terms of robustness against ...
Bosung Yang, Gyeongsup Lim, Junbeom Hur
doaj +1 more source
Research on Digital Watermarking Algorithm for Anti-geometric Attack [PDF]
For the problem that the traditional digital watermarking algorithm is less robustness against geometric attacks, this paper introduces the related content of digital watermarking technology, which combs digital watermarking technology, digital ...
Lin Lixuan
doaj +1 more source
Hybrid SVD-Based Image Watermarking Schemes: A Review
Watermarking is an important technique for protecting sensitive e-multimedia data and intellectual property. Watermarking techniques are used for many applications such as ownership protection, which is a popular area of research as compared to others ...
Wafa' Hamdan Alshoura +4 more
doaj +1 more source

