Gotowa bibliografia na temat „DUAL WATERMARKING”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „DUAL WATERMARKING”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "DUAL WATERMARKING"
Ye, Zhengmao, Hang Yin i Yongmao Ye. "Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis". Applied System Innovation 1, nr 4 (17.10.2018): 40. http://dx.doi.org/10.3390/asi1040040.
Pełny tekst źródłaAthalye, Mrs S. S., Mr Pranav Gurav, Mr Rohan Chavan i Mr Rohit Pashte. "Study on Dual Watermarking". International Journal of Engineering Trends and Technology 20, nr 6 (25.02.2015): 260–62. http://dx.doi.org/10.14445/22315381/ijett-v20p251.
Pełny tekst źródłaGao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng i De Kai Ba. "Dual Video Watermarking Scheme Based on Transform Domain". Applied Mechanics and Materials 155-156 (luty 2012): 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.
Pełny tekst źródłaPriya, Mrs A. Lakshmi, i S. Letitia. "Dual Watermarking in Cyber Security". JOURNAL OF ADVANCES IN CHEMISTRY 13, nr 10 (4.03.2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.
Pełny tekst źródłaGhai, Deepika, Hemant Kumar Gianey, Arpit Jain i Raminder Singh Uppal. "Quantum and dual-tree complex wavelet transform-based image watermarking". International Journal of Modern Physics B 34, nr 04 (21.01.2020): 2050009. http://dx.doi.org/10.1142/s0217979220500095.
Pełny tekst źródłaAbraham, Jobin. "A Multi-purpose Dual Watermarking Scheme". International Journal of Computer Applications 77, nr 8 (18.09.2013): 1–4. http://dx.doi.org/10.5120/13411-1066.
Pełny tekst źródłaZhang, Zhengwei, Lifa Wu, Huabo Li, Haiguang Lai i Chenghui Zheng. "Dual Watermarking Algorithm for Medical Image". Journal of Medical Imaging and Health Informatics 7, nr 3 (1.06.2017): 607–22. http://dx.doi.org/10.1166/jmihi.2017.2056.
Pełny tekst źródłaAl-Haj, Ali. "A dual transform audio watermarking algorithm". Multimedia Tools and Applications 73, nr 3 (30.08.2013): 1897–912. http://dx.doi.org/10.1007/s11042-013-1645-z.
Pełny tekst źródłaPhin, Ch’ng Chen, Nurul Hidayah Ab Rahman i Noraini Che Pa. "A Digital Image Watermarking System: An Application of Dual Layer Watermarking Technique". JOIV : International Journal on Informatics Visualization 1, nr 4-2 (16.11.2017): 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.
Pełny tekst źródłaXi, Xu, Xinchang Zhang, Weidong Liang, Qinchuan Xin i Pengcheng Zhang. "Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition". Applied Sciences 9, nr 4 (14.02.2019): 642. http://dx.doi.org/10.3390/app9040642.
Pełny tekst źródłaRozprawy doktorskie na temat "DUAL WATERMARKING"
Cho, Wen-Tsai, i 卓文財. "A Dual Domain Dual Watermarking Technique for Still Image". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/26079441112496220116.
Pełny tekst źródła國立臺北科技大學
電機工程系碩士班
92
The more we are concerned about copyright protection of digital image, the more eagerly we are seeking technologies that promise to keep from pirated copy and tampering. Since digital image watermarking has the potential to fulfill this need, it has become an important research topic for the past decades. A dual-domain dual-watermark (DDDW) scheme based on human visual system and spread spectrum technique is proposed in the thesis for the purpose of owner identification and digital signature. One watermark is visual and embedded into the spatial domain for owner identification and the other is an invisual watermark embedded into the discrete wavelet transform (DWT) domain for digital signature. The former also has an aliasing in the DWT domain to enhance its robustness. When retrieving the watermarks, the detector does not require the original image but four private keys. The experimental results show that high normalized correlations (NC) exist between the embedded and extracted watermarks. Even after an attack, e.g. JPEG compression, JPEG2000 compression, clipping, etc, the extracted watermarks of the proposed scheme are still robust.
Yu, Kun Houng, i 余昆宏. "A Dual Digital Watermarking Based on Visual Cryptography". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/24537692744384883254.
Pełny tekst źródła嶺東科技大學
資訊科技應用研究所
97
This paper proposes a dual digital watermark scheme based on visual cryptography; two share images, which produced by visual secret sharing scheme, are used in this research; one is kept by owner; the other one is hidden in the middle-frequency components using the traditional Discrete Cosine Transform (DCT) that preserves the quality of the protected images. When verifying the copyright, the original images can be restored by applying the decryption rules of rotating share image and image differentiation method to the extracted hidden share image and copyright holder’s share image. This research shows the proposed technique achieves dual copyrights with characteristics.
Chang, Yu-Jen, i 張佑任. "A Dual Audio Watermarking Based on Fast Fourier Transform Technique". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/16354587991465062625.
Pełny tekst źródła嶺東科技大學
資訊科技應用研究所
100
Internet makes our life more convenient, but with that comes some weaknesses: such as easy duplication and the counterfeit; therefore, the intelligence proprietary protection becomes a critical issue. The digital watermarking technology can be used to prevent these weaknesses from occurring; also, most multimedia can have multiple ownerships, so, it’s a necessity to have dual copyright. This research proposes a dual audio watermarking technology that combines visual cryptography technology and Fast Fourier transform (FFT). The process transforms the audio into a frequency domain by FFT, then, uses the visual cryptography to generate two share images from two digital watermarking, then, embeds one share image into the frequency coefficients of the audio, finally, applies the inverse Fast Fourier transform (IFFT) to complete the dual watermarked audio design. When verifying the ownership, the share image can be extracted from the watermarked audio and verified the dual watermarking by applying the visual cryptography.
Chen, Yen-Wen, i 陳彥文. "Dual Hybrid Watermarking Embedded Scheme for Region of Interest in JPEG2000". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/56275483353600846113.
Pełny tekst źródła國立成功大學
電腦與通信工程研究所
93
Abstract To date the most commonly used technique is the DCT-based JPEG. However, JPEG compressed images at low bit rates will result in block effects. The next generation for image compression standard is the wavelet-based JPEG2000. JPEG2000 also provides for new functionality like the ROI (Region of Interest). In this paper, we propose the ROI watermarking embedded scheme in JPEG200. There are three positions in JPEG200 coding flow for information hiding. The first is after the images transform the image data are transformed to wavelet coefficients. For the digital watermarking, the payload is usually low, and multiple embedding with the majority detection or the spread-spectrum concept can be applied. The second hiding location is after quantization .And last hiding location is embedded in the output of tier-2 coding, it can be guaranteed that all the embedded information will be received without error and in a correct order because we avoid the two major sources of information loss. In this paper, we proposed a hybrid watermarking scheme to embed and extract based on the JPEG2000 Codec. Our scheme mix spatial domain watermarking (W1 embedded in gray-level coefficients before JPEG2000 compression) and frequency domain watermarking (W2 embedded in ROI coefficients after quantization). Distortion reduction technique was used on image to lessen image degradation caused by embedding. This kind of scheme is robust to attacks like cut-and-paste, mean filter, luminance, and more.
MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION". Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.
Pełny tekst źródłaLin, Chih-Wen, i 林志文. "Wavelet Based Multipurpose Color Image Watermarking by Using Dual Watermarks with Human Vision System Models". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/09439555968227445479.
Pełny tekst źródła國立交通大學
資訊管理研究所
95
In this study, we propose a complete architecture based on digital watermarking techniques to solve the issue of copyright protection and authentication for digital contents. We apply visible and semi-fragile watermarks as dual watermarks where visible watermarking is used to establish the copyright protection and semi-fragile watermarking authenticates and verifies the integrity of the watermarked image. In order to get the best tradeoff between the embedding energy of watermark and the perceptual translucence for visible watermark, the contrast-sensitive function (CSF) and noise visible function (NVF) of perceptual model is applied which characterizes the global and local image properties and identifies texture and edge regions to determine the optimal watermark locations and strength at the watermark embedding stage. In addition, the perceptual weights according to the basis function amplitudes of DWT coefficients is fine tuned for the best quality of perceptual translucence in the design of the proposed watermarking algorithm. Furthermore, the semi-fragile watermark can detect and localize malicious attack effectively yet tolerate mild modifications such as JPEG compression and channel additive white Gaussian noise (AWGN). From the experimental results, our proposed technique not only improves the PSNR values and visual quality than other algorithms but also preserves the visibility of the watermark visible under various signal processing and advanced image recovery attacks.
Yang, Cheng-Duo, i 楊承鐸. "A MPEG-2 Video Dual Watermarking Technique based on Temporal Modulation of Low-Frequency DCT Coefficients". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/11562461593504805503.
Pełny tekst źródła中國文化大學
機械工程學系數位機電碩士班
101
The low-frequency DCT coefficients of an image are relatively insensitive to geometric processing. In this paper, the low-frequency DCT coefficients of a full DCT domain are divided into several blocks, and the mean of the coefficients of each block is temporally modulated based on the watermark information bits. This method can embed watermark information both in space and time domain, and achieves the goal of blind detection and incremental of watermark information. The experimental results show that the proposed method is robust against rotating, cropping, scaling, filtering, and compressing attacks.
Książki na temat "DUAL WATERMARKING"
Zhao, Yang. Dual domain semi-fragile watermarking for image authentication. Ottawa: National Library of Canada, 2003.
Znajdź pełny tekst źródłaCzęści książek na temat "DUAL WATERMARKING"
Ur-Rehman, Obaid, i Natasa Zivic. "Dual Watermarking". W Signals and Communication Technology, 39–51. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78942-2_5.
Pełny tekst źródłaHu, Yongjian, Jiwu Huang, Sam Kwong i Y. K. Chan. "Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform". W Digital Watermarking, 86–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_7.
Pełny tekst źródłaSrinadh, V., Balajee Maram i T. Daniya. "Dual Image-Based High Quality Digital Image Watermarking". W Smart Technologies for Power and Green Energy, 169–77. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2764-5_14.
Pełny tekst źródłaDey, Ashis, Pabitra Pal, Partha Chowdhuri, Biswapati Jana, Sharmistha Jana i Amlan Singha. "Dual Image Based Watermarking Scheme Using Quorum Function". W Advanced Techniques for IoT Applications, 114–23. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4435-1_13.
Pełny tekst źródłaDas, Soumodeep, Subhrajit Sinha Roy, Abhishek Basu i Avik Chattopadhyay. "Implementation of Dual Image Watermarking for Copyright Protection". W Lecture Notes in Electrical Engineering, 65–73. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8752-8_7.
Pełny tekst źródłaLiu, Fan, Hongyong Yang i Gaohuan Lv. "Dual Color Image Blind Watermarking Algorithm Based on Compressive Sensing". W Lecture Notes in Electrical Engineering, 43–52. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6499-9_5.
Pełny tekst źródłaPan, Jeng-Shyang, Jia-Jiao Duan i Wei Li. "A Dual Watermarking Scheme by Using Compressive Sensing and Subsampling". W Advances in Intelligent Systems and Computing, 381–89. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21206-7_32.
Pełny tekst źródłaHabib, Moussa, Sami Sarhan i Lama Rajab. "A Robust-Fragile Dual Watermarking System in the DCT Domain". W Lecture Notes in Computer Science, 548–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552451_74.
Pełny tekst źródłaDegadwala, Sheshang D., i Sanjay Gaur. "4-Share VCS Based Image Watermarking for Dual RST Attacks". W Computational Vision and Bio Inspired Computing, 902–12. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71767-8_77.
Pełny tekst źródłaMehta, Sachin, Vijayaraghavan Varadharajan i Rajarathnam Nallusamy. "Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images". W Lecture Notes in Computer Science, 575–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29280-4_67.
Pełny tekst źródłaStreszczenia konferencji na temat "DUAL WATERMARKING"
Mehra, Neelesh, i Madhu Shandilya. "Dual watermarking scheme for secure buyer-seller watermarking protocol". W Fourth International Conference on Digital Image Processing (ICDIP 2012), redaktorzy Mohamed Othman, Sukumar Senthilkumar i Xie Yi. SPIE, 2012. http://dx.doi.org/10.1117/12.956459.
Pełny tekst źródłaQu, Zhiguo, i Cong Jin. "Self-Restoring Dual Watermarking Technology". W 2007 IEEE International Conference on System of Systems Engineering. IEEE, 2007. http://dx.doi.org/10.1109/sysose.2007.4304245.
Pełny tekst źródłaShouchun Ni, Wenjun Zhang i Aijun Dong. "A dual watermarking scheme for DRM". W 2008 International Conference on Audio, Language and Image Processing (ICALIP). IEEE, 2008. http://dx.doi.org/10.1109/icalip.2008.4590161.
Pełny tekst źródłaBhatnagar, Gaurav, Balasubramanian Raman i K. Swaminathan. "DWT-SVD based Dual Watermarking Scheme". W 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664404.
Pełny tekst źródłaHua, Guang, Guoan Bi i Yong Xiang. "Dual channel watermarking — A filter perspective". W 2016 International Conference on Progress in Informatics and Computing (PIC). IEEE, 2016. http://dx.doi.org/10.1109/pic.2016.7949571.
Pełny tekst źródłaSingh, V. K., A. K. Singh, R. B. Patel i B. P. Singh. "Dual Level Digital Watermarking for Images". W INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10). AIP, 2010. http://dx.doi.org/10.1063/1.3526215.
Pełny tekst źródłaZhang, Jianhong, Xiaoming Yang i Xiaofei Xie. "Dual-watermarking algorithm based on Contourlet". W 2010 International Conference on Intelligent Control and Information Processing (ICICIP). IEEE, 2010. http://dx.doi.org/10.1109/icicip.2010.5564207.
Pełny tekst źródłaZhang Yong-mei, Ma Li, Xing Xiu-juan i Wang Kai-fen. "A new dual-video watermarking algorithm". W 2010 2nd International Conference on Information Science and Engineering (ICISE). IEEE, 2010. http://dx.doi.org/10.1109/icise.2010.5691804.
Pełny tekst źródłaMohanty, Saraju P., K. R. Ramakrishnan i Mohan Kankanhalli. "A dual watermarking technique for images". W the seventh ACM international conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/319878.319891.
Pełny tekst źródłaMohan, B. C., S. Srinivas Kumar i B. N. Chatterjee. "Digital image watermarking in dual domains". W IET International Conference on Visual Information Engineering (VIE 2006). IEE, 2006. http://dx.doi.org/10.1049/cp:20060566.
Pełny tekst źródła