Results 11 to 20 of about 42,016 (177)

A constructive and unifying framework for zero-bit watermarking [PDF]

open access: yes, 2006
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this
Furon, Teddy
core   +7 more sources

Information hiding through variance of the parametric orientation underlying a B-rep face [PDF]

open access: yes, 2008
Watermarking technologies have been proposed for many different,types of digital media. However, to this date, no viable watermarking techniques have yet emerged for the high value B-rep (i.e.
Corney, Jonathan   +2 more
core   +1 more source

WATERMARKING CIPHERS [PDF]

open access: yesPrikladnaya diskretnaya matematika, 2015
Summary: In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext \(x\) by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text \(x ...
openaire   +5 more sources

Scene-based imperceptible-visible watermarking for HDR video content [PDF]

open access: yes, 2019
This paper presents the High Dynamic Range - Imperceptible Visible Watermarking for HDR video content (HDR-IVW-V) based on scene detection for robust copyright protection of HDR videos using a visually imperceptible watermarking methodology.
Garcia-Ugalde, F.   +2 more
core   +1 more source

Robust Backward Model Watermarking Method Based on Backdoor [PDF]

open access: yesJisuanji gongcheng
The training cost of deep learning model is high; however, the stealing cost is low. This model is easy to copy and spread. The copyright owner of a model can embed a watermark in the model using a backdoor or another method.
Jiaxin ZENG, Weiming ZHANG, Rong ZHANG
doaj   +1 more source

Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform

open access: yesIET Biometrics, 2022
With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it.
Dekai Li   +5 more
doaj   +1 more source

Video Dual Watermarking Algorithm Based on Mean Ratio and Compressive Sensing [PDF]

open access: yesJisuanji gongcheng, 2019
In order to improve the information quality and anti-attack ability of video watermarking algorithm,a video dual watermarking algorithm is proposed.Robust watermark is constructed by robustness of selecting block global mean and block mean.Based on ...
WANG Nan,LI Zhi,CHENG Xinyu,CHEN Yi,LUO Hao
doaj   +1 more source

Comparison of multiple watermarking techniques using genetic algorithms

open access: yesJournal of Electrical Systems and Information Technology, 2016
Multiple watermarking is used to share the copyright of multiple users, increase robustness and high security. The proposed method is comparison of multiple-watermarking techniques based on Discrete Wavelet Transform and Singular Value Decomposition ...
N. Mohananthini, G. Yamuna
doaj   +1 more source

Secure secret sharing in the cloud [PDF]

open access: yes, 2017
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core   +1 more source

A contrast-sensitive reversible visible image watermarking technique [PDF]

open access: yes, 2009
A reversible (also called lossless, distortion-free, or invertible) visible watermarking scheme is proposed to satisfy the applications, in which the visible watermark is expected to combat copyright piracy but can be removed to losslessly recover the ...
Li, Chang-Tsun   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy