Results 91 to 100 of about 42,016 (177)

WATERMARK DENGAN GABUNGAN STEGANOGRAFI DAN VISIBLE WATERMARKING

open access: yesJurnal Algoritma, Logika dan Komputasi, 2018
Images, that are currently circulating on the internet are many, such as advertising images for the promotion of products from a particular brand / institution, the image of the digital image, photographs of the works of famous photographers and many other examples.
Juni Rosmiyati   +1 more
openaire   +2 more sources

PERFORMANCE ANALYSIS OF SECURE MEDICAL IMAGE COMMUNICATION WITH DIGITAL SIGNATURE AND REVERSIBLE WATERMARKING [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2013
Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which ...
A. Umamageswari, G. R. Suresh
doaj  

Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables

open access: yesIEEE Access
The use of watermarking techniques, which incorporate invisible information into multimedia files, is crucial for securing digital content.
Yasmin Alaa Hassan, Abdul Monem S. Rahma
doaj   +1 more source

Watermarks [PDF]

open access: yesElectronic Workshops in Computing, 2017
openaire   +1 more source

SPY-Watermark: Robust Invisible Watermarking for Backdoor Attack

open access: yesICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Backdoor attack aims to deceive a victim model when facing backdoor instances while maintaining its performance on benign data. Current methods use manual patterns or special perturbations as triggers, while they often overlook the robustness against data corruption, making backdoor attacks easy to defend in practice.
Wang, Ruofei   +4 more
openaire   +2 more sources

Digital Image Watermarking Using Ellipse Watermark

open access: yes, 2018
From past few decades watermarking became very crucial for digital images being transmitted over network. All the time ownership and license are great issues if someone fetches the image sent by one without any ownership seal, i.e. watermark, and uses as his own image.
openaire   +1 more source

Invertible networks-based method with dual-embedding and attack layer for robust audio watermarking

open access: yes大数据
Digital audio watermarking aims to embed information into audio and accurately extract it from the watermarked audio. Traditional methods rely on algorithms designed based on expert experience to embed watermarks into the time domain or transform domain ...
ZHANG Xulong   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy