WATERMARK DENGAN GABUNGAN STEGANOGRAFI DAN VISIBLE WATERMARKING
Images, that are currently circulating on the internet are many, such as advertising images for the promotion of products from a particular brand / institution, the image of the digital image, photographs of the works of famous photographers and many other examples.
Juni Rosmiyati +1 more
openaire +2 more sources
PERFORMANCE ANALYSIS OF SECURE MEDICAL IMAGE COMMUNICATION WITH DIGITAL SIGNATURE AND REVERSIBLE WATERMARKING [PDF]
Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which ...
A. Umamageswari, G. R. Suresh
doaj
Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables
The use of watermarking techniques, which incorporate invisible information into multimedia files, is crucial for securing digital content.
Yasmin Alaa Hassan, Abdul Monem S. Rahma
doaj +1 more source
SPY-Watermark: Robust Invisible Watermarking for Backdoor Attack
Backdoor attack aims to deceive a victim model when facing backdoor instances while maintaining its performance on benign data. Current methods use manual patterns or special perturbations as triggers, while they often overlook the robustness against data corruption, making backdoor attacks easy to defend in practice.
Wang, Ruofei +4 more
openaire +2 more sources
Digital Image Watermarking Using Ellipse Watermark
From past few decades watermarking became very crucial for digital images being transmitted over network. All the time ownership and license are great issues if someone fetches the image sent by one without any ownership seal, i.e. watermark, and uses as his own image.
openaire +1 more source
Invertible networks-based method with dual-embedding and attack layer for robust audio watermarking
Digital audio watermarking aims to embed information into audio and accurately extract it from the watermarked audio. Traditional methods rely on algorithms designed based on expert experience to embed watermarks into the time domain or transform domain ...
ZHANG Xulong +4 more
doaj +2 more sources
Deep Learning for Image Watermarking: A Comprehensive Review and Analysis of Techniques, Challenges, and Applications. [PDF]
Bistroń M, Żurada JM, Piotrowski Z.
europepmc +1 more source
Hybrid wavelet transform, K-means singular value decomposition and Spatial memory guided cat swarm optimization technique for watermark embedding. [PDF]
Sharma C +5 more
europepmc +1 more source

