Littérature scientifique sur le sujet « DUAL WATERMARKING »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « DUAL WATERMARKING ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "DUAL WATERMARKING"

1

Ye, Zhengmao, Hang Yin et Yongmao Ye. « Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis ». Applied System Innovation 1, no 4 (17 octobre 2018) : 40. http://dx.doi.org/10.3390/asi1040040.

Texte intégral
Résumé :
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-chaotic dynamical system. Chaotic watermarking was conducted in the spatial domain, where suboptimal secure hashing with a variable length was selected in preprocessing stages. The secret key was generated by the chaotic sequence for pixel shuffling using a chaotic logistic map, so that a controlled amount of distortion was inserted into the host digital image. Watermarking was proceeded after the chaotic watermark had been embedded into the shuffled image. To strengthen the security, the hyper-chaotic system was used to generate chaotic blocks for block scrambling in order to achieve dual chaotic watermarking. Characteristics analysis was conducted for multiple examples in both spatial and frequency domains. Potential effects induced by the chaotic driving parameter on processing time and integrity authentication of chaotic dual watermarking were also analyzed in detail.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Athalye, Mrs S. S., Mr Pranav Gurav, Mr Rohan Chavan et Mr Rohit Pashte. « Study on Dual Watermarking ». International Journal of Engineering Trends and Technology 20, no 6 (25 février 2015) : 260–62. http://dx.doi.org/10.14445/22315381/ijett-v20p251.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng et De Kai Ba. « Dual Video Watermarking Scheme Based on Transform Domain ». Applied Mechanics and Materials 155-156 (février 2012) : 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Texte intégral
Résumé :
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the video effectively, but also protect against some attacks, such as shearing attack, JPEG lossy compression attack, noise attack etc. This scheme has better robustness and invisibility.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Priya, Mrs A. Lakshmi, et S. Letitia. « Dual Watermarking in Cyber Security ». JOURNAL OF ADVANCES IN CHEMISTRY 13, no 10 (4 mars 2017) : 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Texte intégral
Résumé :
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ghai, Deepika, Hemant Kumar Gianey, Arpit Jain et Raminder Singh Uppal. « Quantum and dual-tree complex wavelet transform-based image watermarking ». International Journal of Modern Physics B 34, no 04 (21 janvier 2020) : 2050009. http://dx.doi.org/10.1142/s0217979220500095.

Texte intégral
Résumé :
Nowadays, multimedia applications are extensively utilized and communicated over Internet. Due to the use of public networks for communication, the multimedia data are prone to various security attacks. In the past few decades, image watermarking has been extensively utilized to handle this issue. Its main objective is to embed a watermark into a host multimedia data without affecting its presentation. However, the existing methods are not so effective against multiplicative attacks. Therefore, in this paper, a novel quantum-based image watermarking technique is proposed. It initially computes the dual-tree complex wavelet transform coefficients of an input cover image. The watermark image is then scrambled using Arnold transform. Thereafter, in the lower coefficient input the watermark image is embedded using quantum-based singular value decomposition (SVD). Finally, the covered image is obtained by applying the inverse dual-tree complex wavelet transform on the obtained coefficients. Comparative analyses are carried out by considering the proposed and the existing watermarking techniques. It has been found that the proposed technique outperforms existing watermarking techniques in terms of various performance metrics.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Abraham, Jobin. « A Multi-purpose Dual Watermarking Scheme ». International Journal of Computer Applications 77, no 8 (18 septembre 2013) : 1–4. http://dx.doi.org/10.5120/13411-1066.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Zhengwei, Lifa Wu, Huabo Li, Haiguang Lai et Chenghui Zheng. « Dual Watermarking Algorithm for Medical Image ». Journal of Medical Imaging and Health Informatics 7, no 3 (1 juin 2017) : 607–22. http://dx.doi.org/10.1166/jmihi.2017.2056.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Al-Haj, Ali. « A dual transform audio watermarking algorithm ». Multimedia Tools and Applications 73, no 3 (30 août 2013) : 1897–912. http://dx.doi.org/10.1007/s11042-013-1645-z.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Phin, Ch’ng Chen, Nurul Hidayah Ab Rahman et Noraini Che Pa. « A Digital Image Watermarking System : An Application of Dual Layer Watermarking Technique ». JOIV : International Journal on Informatics Visualization 1, no 4-2 (16 novembre 2017) : 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.

Texte intégral
Résumé :
Watermarking is a method to digitally sign a product to provide authentication and prevent copyright infringement to proving the ownership of a product and provides integrity for companies to protect their product. In this study, dual layer watermark that applies two different watermarking techniques at each layer is presented. The first layer applies the LSB Substitution technique while the second layer uses the Discrete Wavelet Transform (DWT) technique. This implies greater integrity as it contains of two signatures in providing authentication.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Xi, Xu, Xinchang Zhang, Weidong Liang, Qinchuan Xin et Pengcheng Zhang. « Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition ». Applied Sciences 9, no 4 (14 février 2019) : 642. http://dx.doi.org/10.3390/app9040642.

Texte intégral
Résumé :
Digital watermarking is important for the copyright protection of electronic data, but embedding watermarks into vector maps could easily lead to changes in map precision. Zero-watermarking, a method that does not embed watermarks into maps, could avoid altering vector maps but often lack of robustness. This study proposes a dual zero-watermarking scheme that improves watermark robustness for two-dimensional (2D) vector maps. The proposed scheme first extracts the feature vertices and non-feature vertices of the vector map with the Douglas-Peucker algorithm and subsequently constructs the Delaunay Triangulation Mesh (DTM) to form a topological feature sequence of feature vertices as well as the Singular Value Decomposition (SVD) matrix to form intrinsic feature sequence of non-feature vertices. Next, zero-watermarks are obtained by executing exclusive disjunction (XOR) with the encrypted watermark image under the Arnold scramble algorithm. The experimental results show that the scheme that synthesizes both the feature and non-feature information improves the watermark capacity. Making use of complementary information between feature and non-feature vertices considerably improves the overall robustness of the watermarking scheme. The proposed dual zero-watermarking scheme combines the advantages of individual watermarking schemes and is robust against such attacks as geometric attacks, vertex attacks and object attacks.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "DUAL WATERMARKING"

1

Cho, Wen-Tsai, et 卓文財. « A Dual Domain Dual Watermarking Technique for Still Image ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/26079441112496220116.

Texte intégral
Résumé :
碩士
國立臺北科技大學
電機工程系碩士班
92
The more we are concerned about copyright protection of digital image, the more eagerly we are seeking technologies that promise to keep from pirated copy and tampering. Since digital image watermarking has the potential to fulfill this need, it has become an important research topic for the past decades. A dual-domain dual-watermark (DDDW) scheme based on human visual system and spread spectrum technique is proposed in the thesis for the purpose of owner identification and digital signature. One watermark is visual and embedded into the spatial domain for owner identification and the other is an invisual watermark embedded into the discrete wavelet transform (DWT) domain for digital signature. The former also has an aliasing in the DWT domain to enhance its robustness. When retrieving the watermarks, the detector does not require the original image but four private keys. The experimental results show that high normalized correlations (NC) exist between the embedded and extracted watermarks. Even after an attack, e.g. JPEG compression, JPEG2000 compression, clipping, etc, the extracted watermarks of the proposed scheme are still robust.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Yu, Kun Houng, et 余昆宏. « A Dual Digital Watermarking Based on Visual Cryptography ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/24537692744384883254.

Texte intégral
Résumé :
碩士
嶺東科技大學
資訊科技應用研究所
97
This paper proposes a dual digital watermark scheme based on visual cryptography; two share images, which produced by visual secret sharing scheme, are used in this research; one is kept by owner; the other one is hidden in the middle-frequency components using the traditional Discrete Cosine Transform (DCT) that preserves the quality of the protected images. When verifying the copyright, the original images can be restored by applying the decryption rules of rotating share image and image differentiation method to the extracted hidden share image and copyright holder’s share image. This research shows the proposed technique achieves dual copyrights with characteristics.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Chang, Yu-Jen, et 張佑任. « A Dual Audio Watermarking Based on Fast Fourier Transform Technique ». Thesis, 2012. http://ndltd.ncl.edu.tw/handle/16354587991465062625.

Texte intégral
Résumé :
碩士
嶺東科技大學
資訊科技應用研究所
100
Internet makes our life more convenient, but with that comes some weaknesses: such as easy duplication and the counterfeit; therefore, the intelligence proprietary protection becomes a critical issue. The digital watermarking technology can be used to prevent these weaknesses from occurring; also, most multimedia can have multiple ownerships, so, it’s a necessity to have dual copyright. This research proposes a dual audio watermarking technology that combines visual cryptography technology and Fast Fourier transform (FFT). The process transforms the audio into a frequency domain by FFT, then, uses the visual cryptography to generate two share images from two digital watermarking, then, embeds one share image into the frequency coefficients of the audio, finally, applies the inverse Fast Fourier transform (IFFT) to complete the dual watermarked audio design. When verifying the ownership, the share image can be extracted from the watermarked audio and verified the dual watermarking by applying the visual cryptography.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Chen, Yen-Wen, et 陳彥文. « Dual Hybrid Watermarking Embedded Scheme for Region of Interest in JPEG2000 ». Thesis, 2005. http://ndltd.ncl.edu.tw/handle/56275483353600846113.

Texte intégral
Résumé :
碩士
國立成功大學
電腦與通信工程研究所
93
Abstract  To date the most commonly used technique is the DCT-based JPEG. However, JPEG compressed images at low bit rates will result in block effects. The next generation for image compression standard is the wavelet-based JPEG2000. JPEG2000 also provides for new functionality like the ROI (Region of Interest). In this paper, we propose the ROI watermarking embedded scheme in JPEG200.  There are three positions in JPEG200 coding flow for information hiding. The first is after the images transform the image data are transformed to wavelet coefficients. For the digital watermarking, the payload is usually low, and multiple embedding with the majority detection or the spread-spectrum concept can be applied. The second hiding location is after quantization .And last hiding location is embedded in the output of tier-2 coding, it can be guaranteed that all the embedded information will be received without error and in a correct order because we avoid the two major sources of information loss.  In this paper, we proposed a hybrid watermarking scheme to embed and extract based on the JPEG2000 Codec. Our scheme mix spatial domain watermarking (W1 embedded in gray-level coefficients before JPEG2000 compression) and frequency domain watermarking (W2 embedded in ROI coefficients after quantization). Distortion reduction technique was used on image to lessen image degradation caused by embedding. This kind of scheme is robust to attacks like cut-and-paste, mean filter, luminance, and more.
Styles APA, Harvard, Vancouver, ISO, etc.
5

MONIKA. « DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION ». Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.

Texte intégral
Résumé :
The availability of versatile multimedia processing software and the far-reaching coverage of the interconnected networks have facilitated flawless copying, manipulations and distribution of the digital multimedia (digital video, audio, text, and images). The ever advancing storage and retrieval technologies have also smoothed the way for large-scale multimedia database applications. However, abuses of these facilities and technologies pose pressing threats to multimedia security management in general, and multimedia copyright protection and content integrity verification in particular. Although cryptography has a long history of application to information and multimedia security, the undesirable characteristic of providing no protection to the media once decrypted has limited the feasibility of its widespread use. For example, an adversary can obtain the decryption key by purchasing a legal copy of the media but then redistribute the decrypted copies of the original .In response to these challenges; digital watermarking techniques have been proposed in the last decade. Digital watermarking is the procedure whereby secret information (the watermark) is embedded into the host multimedia content, such that it is: (1) hidden, i.e., not perceptually visible; and (2) recoverable, even after the content is degraded by different attacks such JPEG compression, noise, horizontal and vertical flips etc. The two basic requirements for an effective watermarking scheme, imperceptibility and robustness, conflict with each other. The main focus of this thesis is to provide good tradeoff between perceptual quality of the watermarked image and its robustness against different attacks. For this purpose, we have discussed a robust digital watermarking technique in discrete wavelet (DWT) domain. This scheme employs a contrast sensitivity based human visual system (HVS) model. The iv HVS models give us a direct way to determine the maximum strength of watermark signal that each portion of an image can tolerate without affecting the visual quality of the image. The proposed work develops a novel approach of embedding both visible and invisible watermarks into cover image. Visible watermark is used only to distract the hacker /unauthorized user as actual watermark is inserted invisibly. This increases the security two fold as visible watermark act as copyright logo and invisible serves the purpose of authentication. This is carried out by embedding primary watermark visibly using alpha blending and the DWT coefficients of the host image have been modified for embedding invisible secondary watermark. The proposed approach incorporates both blind and non blind methods into one watermarking scheme and work well on grayscale as well as color images. Performed objective and subjective analysis proves the efficiency of proposed approach.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Lin, Chih-Wen, et 林志文. « Wavelet Based Multipurpose Color Image Watermarking by Using Dual Watermarks with Human Vision System Models ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/09439555968227445479.

Texte intégral
Résumé :
碩士
國立交通大學
資訊管理研究所
95
In this study, we propose a complete architecture based on digital watermarking techniques to solve the issue of copyright protection and authentication for digital contents. We apply visible and semi-fragile watermarks as dual watermarks where visible watermarking is used to establish the copyright protection and semi-fragile watermarking authenticates and verifies the integrity of the watermarked image. In order to get the best tradeoff between the embedding energy of watermark and the perceptual translucence for visible watermark, the contrast-sensitive function (CSF) and noise visible function (NVF) of perceptual model is applied which characterizes the global and local image properties and identifies texture and edge regions to determine the optimal watermark locations and strength at the watermark embedding stage. In addition, the perceptual weights according to the basis function amplitudes of DWT coefficients is fine tuned for the best quality of perceptual translucence in the design of the proposed watermarking algorithm. Furthermore, the semi-fragile watermark can detect and localize malicious attack effectively yet tolerate mild modifications such as JPEG compression and channel additive white Gaussian noise (AWGN). From the experimental results, our proposed technique not only improves the PSNR values and visual quality than other algorithms but also preserves the visibility of the watermark visible under various signal processing and advanced image recovery attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Yang, Cheng-Duo, et 楊承鐸. « A MPEG-2 Video Dual Watermarking Technique based on Temporal Modulation of Low-Frequency DCT Coefficients ». Thesis, 2013. http://ndltd.ncl.edu.tw/handle/11562461593504805503.

Texte intégral
Résumé :
碩士
中國文化大學
機械工程學系數位機電碩士班
101
The low-frequency DCT coefficients of an image are relatively insensitive to geometric processing. In this paper, the low-frequency DCT coefficients of a full DCT domain are divided into several blocks, and the mean of the coefficients of each block is temporally modulated based on the watermark information bits. This method can embed watermark information both in space and time domain, and achieves the goal of blind detection and incremental of watermark information. The experimental results show that the proposed method is robust against rotating, cropping, scaling, filtering, and compressing attacks.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "DUAL WATERMARKING"

1

Zhao, Yang. Dual domain semi-fragile watermarking for image authentication. Ottawa : National Library of Canada, 2003.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "DUAL WATERMARKING"

1

Ur-Rehman, Obaid, et Natasa Zivic. « Dual Watermarking ». Dans Signals and Communication Technology, 39–51. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78942-2_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Hu, Yongjian, Jiwu Huang, Sam Kwong et Y. K. Chan. « Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform ». Dans Digital Watermarking, 86–100. Berlin, Heidelberg : Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Srinadh, V., Balajee Maram et T. Daniya. « Dual Image-Based High Quality Digital Image Watermarking ». Dans Smart Technologies for Power and Green Energy, 169–77. Singapore : Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2764-5_14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Dey, Ashis, Pabitra Pal, Partha Chowdhuri, Biswapati Jana, Sharmistha Jana et Amlan Singha. « Dual Image Based Watermarking Scheme Using Quorum Function ». Dans Advanced Techniques for IoT Applications, 114–23. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Das, Soumodeep, Subhrajit Sinha Roy, Abhishek Basu et Avik Chattopadhyay. « Implementation of Dual Image Watermarking for Copyright Protection ». Dans Lecture Notes in Electrical Engineering, 65–73. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8752-8_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Liu, Fan, Hongyong Yang et Gaohuan Lv. « Dual Color Image Blind Watermarking Algorithm Based on Compressive Sensing ». Dans Lecture Notes in Electrical Engineering, 43–52. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6499-9_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Pan, Jeng-Shyang, Jia-Jiao Duan et Wei Li. « A Dual Watermarking Scheme by Using Compressive Sensing and Subsampling ». Dans Advances in Intelligent Systems and Computing, 381–89. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21206-7_32.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Habib, Moussa, Sami Sarhan et Lama Rajab. « A Robust-Fragile Dual Watermarking System in the DCT Domain ». Dans Lecture Notes in Computer Science, 548–53. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552451_74.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Degadwala, Sheshang D., et Sanjay Gaur. « 4-Share VCS Based Image Watermarking for Dual RST Attacks ». Dans Computational Vision and Bio Inspired Computing, 902–12. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71767-8_77.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Mehta, Sachin, Vijayaraghavan Varadharajan et Rajarathnam Nallusamy. « Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images ». Dans Lecture Notes in Computer Science, 575–82. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29280-4_67.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "DUAL WATERMARKING"

1

Mehra, Neelesh, et Madhu Shandilya. « Dual watermarking scheme for secure buyer-seller watermarking protocol ». Dans Fourth International Conference on Digital Image Processing (ICDIP 2012), sous la direction de Mohamed Othman, Sukumar Senthilkumar et Xie Yi. SPIE, 2012. http://dx.doi.org/10.1117/12.956459.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Qu, Zhiguo, et Cong Jin. « Self-Restoring Dual Watermarking Technology ». Dans 2007 IEEE International Conference on System of Systems Engineering. IEEE, 2007. http://dx.doi.org/10.1109/sysose.2007.4304245.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shouchun Ni, Wenjun Zhang et Aijun Dong. « A dual watermarking scheme for DRM ». Dans 2008 International Conference on Audio, Language and Image Processing (ICALIP). IEEE, 2008. http://dx.doi.org/10.1109/icalip.2008.4590161.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bhatnagar, Gaurav, Balasubramanian Raman et K. Swaminathan. « DWT-SVD based Dual Watermarking Scheme ». Dans 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664404.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hua, Guang, Guoan Bi et Yong Xiang. « Dual channel watermarking — A filter perspective ». Dans 2016 International Conference on Progress in Informatics and Computing (PIC). IEEE, 2016. http://dx.doi.org/10.1109/pic.2016.7949571.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Singh, V. K., A. K. Singh, R. B. Patel et B. P. Singh. « Dual Level Digital Watermarking for Images ». Dans INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526215.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Jianhong, Xiaoming Yang et Xiaofei Xie. « Dual-watermarking algorithm based on Contourlet ». Dans 2010 International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2010. http://dx.doi.org/10.1109/icicip.2010.5564207.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Zhang Yong-mei, Ma Li, Xing Xiu-juan et Wang Kai-fen. « A new dual-video watermarking algorithm ». Dans 2010 2nd International Conference on Information Science and Engineering (ICISE). IEEE, 2010. http://dx.doi.org/10.1109/icise.2010.5691804.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mohanty, Saraju P., K. R. Ramakrishnan et Mohan Kankanhalli. « A dual watermarking technique for images ». Dans the seventh ACM international conference. New York, New York, USA : ACM Press, 1999. http://dx.doi.org/10.1145/319878.319891.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Mohan, B. C., S. Srinivas Kumar et B. N. Chatterjee. « Digital image watermarking in dual domains ». Dans IET International Conference on Visual Information Engineering (VIE 2006). IEE, 2006. http://dx.doi.org/10.1049/cp:20060566.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie