Results 11 to 20 of about 42,016 (177)
A constructive and unifying framework for zero-bit watermarking [PDF]
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the presence of this particular weak signal in content. The article looks at this
Furon, Teddy
core +7 more sources
Information hiding through variance of the parametric orientation underlying a B-rep face [PDF]
Watermarking technologies have been proposed for many different,types of digital media. However, to this date, no viable watermarking techniques have yet emerged for the high value B-rep (i.e.
Corney, Jonathan +2 more
core +1 more source
Summary: In order to protect both data confidentiality and legality, a concept of a watermarking cipher (also called a w-cipher) is defined. The main idea of this cjncept is as follows: the transformation of a plaintext \(x\) by the composition of encryption and decryption operations using some encryption and decryption keys yields a proper text \(x ...
openaire +5 more sources
Scene-based imperceptible-visible watermarking for HDR video content [PDF]
This paper presents the High Dynamic Range - Imperceptible Visible Watermarking for HDR video content (HDR-IVW-V) based on scene detection for robust copyright protection of HDR videos using a visually imperceptible watermarking methodology.
Garcia-Ugalde, F. +2 more
core +1 more source
Robust Backward Model Watermarking Method Based on Backdoor [PDF]
The training cost of deep learning model is high; however, the stealing cost is low. This model is easy to copy and spread. The copyright owner of a model can embed a watermark in the model using a backdoor or another method.
Jiaxin ZENG, Weiming ZHANG, Rong ZHANG
doaj +1 more source
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform
With the continuous progress and development in the field of Internet technology, the area of medical image processing has also developed along with it.
Dekai Li +5 more
doaj +1 more source
Video Dual Watermarking Algorithm Based on Mean Ratio and Compressive Sensing [PDF]
In order to improve the information quality and anti-attack ability of video watermarking algorithm,a video dual watermarking algorithm is proposed.Robust watermark is constructed by robustness of selecting block global mean and block mean.Based on ...
WANG Nan,LI Zhi,CHENG Xinyu,CHEN Yi,LUO Hao
doaj +1 more source
Comparison of multiple watermarking techniques using genetic algorithms
Multiple watermarking is used to share the copyright of multiple users, increase robustness and high security. The proposed method is comparison of multiple-watermarking techniques based on Discrete Wavelet Transform and Singular Value Decomposition ...
N. Mohananthini, G. Yamuna
doaj +1 more source
Secure secret sharing in the cloud [PDF]
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets.
Chang, Ching-Chun, Li, Chang-Tsun
core +1 more source
A contrast-sensitive reversible visible image watermarking technique [PDF]
A reversible (also called lossless, distortion-free, or invertible) visible watermarking scheme is proposed to satisfy the applications, in which the visible watermark is expected to combat copyright piracy but can be removed to losslessly recover the ...
Li, Chang-Tsun +4 more
core +1 more source

