Results 31 to 40 of about 42,975 (207)

Multipurpose zero watermarking algorithm for medical image based on SVD and SAE

open access: yesDianxin kexue, 2017
A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original ...
Jieli SUN   +3 more
doaj   +2 more sources

A Robust Image Watermarking Scheme Based on SVD in the Spatial Domain

open access: yesFuture Internet, 2017
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment.
Heng Zhang, Chengyou Wang, Xiao Zhou
doaj   +1 more source

Coded DNN Watermark: Robustness against Pruning Models Using Constant Weight Code

open access: yesJournal of Imaging, 2022
Deep Neural Network (DNN) watermarking techniques are increasingly being used to protect the intellectual property of DNN models. Basically, DNN watermarking is a technique to insert side information into the DNN model without significantly degrading the
Tatsuya Yasui   +3 more
doaj   +1 more source

Statistical Watermarking for Networked Control Systems

open access: yes, 2017
Watermarking can detect sensor attacks in control systems by injecting a private signal into the control, whereby attacks are identified by checking the statistics of the sensor measurements and private signal.
abrams   +8 more
core   +1 more source

Parallel Digital Watermarking Process on Ultrasound Medical Images in Multicores Environment

open access: yesInternational Journal of Biomedical Imaging, 2016
With the advancement of technology in communication network, it facilitated digital medical images transmitted to healthcare professionals via internal network or public network (e.g., Internet), but it also exposes the transmitted digital medical images
Hui Liang Khor   +2 more
doaj   +1 more source

JND-Guided Perceptually Color Image Watermarking in Spatial Domain

open access: yesIEEE Access, 2020
Watermarking is an effective solution for copyright protection and forensics tracking via hiding information into the image signal. Recently, spatial-embedding watermarking methods from different transform domain have been proposed rapidly and ...
Wenbo Wan   +4 more
doaj   +1 more source

Efficient methods for digital image watermarking and information embedding

open access: yesMeasurement: Sensors, 2022
Now a day to achieve security of digital data, utilizing digital image watermarking scheme is the option. The primary purpose to upgrade image watermarking scheme is to fulfill the need of sufficient imperceptibility, capacity, and robustness of ...
Sunil Gupta   +5 more
doaj   +1 more source

Wide spread spectrum watermarking with side information and interference cancellation

open access: yes, 2008
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum of a set of carrier vectors, which are modulated by the bits to be ...
Guelvouit, Gaëtan Le, Pateux, Stéphane
core   +2 more sources

Metachromatic Butterfly Bile Pigments for Multi‐Level Optical Security Films

open access: yesAdvanced Functional Materials, EarlyView.
Bio‐derived optical security materials are manufactured by embedding butterfly‐based pigments in polymer films. Tunable color and fluorescence responses arise from concentration‐controlled metachromasy, enabling spatially encoded patterns with distinct visible, UV‐active, and spectral signatures.
Limin Wang, Bodo D. Wilts
wiley   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy