Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: DUAL WATERMARKING.

Artykuły w czasopismach na temat „DUAL WATERMARKING”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „DUAL WATERMARKING”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Ye, Zhengmao, Hang Yin i Yongmao Ye. "Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis". Applied System Innovation 1, nr 4 (17.10.2018): 40. http://dx.doi.org/10.3390/asi1040040.

Pełny tekst źródła
Streszczenie:
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-chaotic dynamical system. Chaotic watermarking was conducted in the spatial domain, where suboptimal secure hashing with a variable length was selected in preprocessing stages. The secret key was generated by the chaotic sequence for pixel shuffling using a chaotic logistic map, so that a controlled amount of distortion was inserted into the host digital image. Watermarking was proceeded after the chaotic watermark had been embedded into the shuffled image. To strengthen the security, the hyper-chaotic system was used to generate chaotic blocks for block scrambling in order to achieve dual chaotic watermarking. Characteristics analysis was conducted for multiple examples in both spatial and frequency domains. Potential effects induced by the chaotic driving parameter on processing time and integrity authentication of chaotic dual watermarking were also analyzed in detail.
Style APA, Harvard, Vancouver, ISO itp.
2

Athalye, Mrs S. S., Mr Pranav Gurav, Mr Rohan Chavan i Mr Rohit Pashte. "Study on Dual Watermarking". International Journal of Engineering Trends and Technology 20, nr 6 (25.02.2015): 260–62. http://dx.doi.org/10.14445/22315381/ijett-v20p251.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gao, Zhan Wei, Yong Mei Zhang, Cong Liu, Jie Geng i De Kai Ba. "Dual Video Watermarking Scheme Based on Transform Domain". Applied Mechanics and Materials 155-156 (luty 2012): 815–19. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.815.

Pełny tekst źródła
Streszczenie:
The single watermark algorithms always merely have single function. In order to overcome the drawback, this paper proposed a dual video watermarking scheme based on transform domain. To implement the video copyright and integrality authentication, this paper embedded robust watermarking and fragile watermark. At the same time, this scheme made good use of the wavelet transform to embed the two different kinds of watermarking in the same video respectively. The fragile watermarking is to serve the robust watermarking. Experiments demonstrate this scheme can not only protect the copyright of the video effectively, but also protect against some attacks, such as shearing attack, JPEG lossy compression attack, noise attack etc. This scheme has better robustness and invisibility.
Style APA, Harvard, Vancouver, ISO itp.
4

Priya, Mrs A. Lakshmi, i S. Letitia. "Dual Watermarking in Cyber Security". JOURNAL OF ADVANCES IN CHEMISTRY 13, nr 10 (4.03.2017): 5923–26. http://dx.doi.org/10.24297/jac.v13i10.5834.

Pełny tekst źródła
Streszczenie:
Cyber security is generally a conservatory of the conventional information system security that is aimed at protecting cyber threats, like cyber terrorism, cyber warfare, and cyber espionage to corrupt digital information. This leads to increase the researches in cyber security. This paper proposes the application of dual watermarking in cyber technology, focusing on forgery detection. The rest of the paper presents a brief overview of cyber security and the role of digital dual watermarking.
Style APA, Harvard, Vancouver, ISO itp.
5

Ghai, Deepika, Hemant Kumar Gianey, Arpit Jain i Raminder Singh Uppal. "Quantum and dual-tree complex wavelet transform-based image watermarking". International Journal of Modern Physics B 34, nr 04 (21.01.2020): 2050009. http://dx.doi.org/10.1142/s0217979220500095.

Pełny tekst źródła
Streszczenie:
Nowadays, multimedia applications are extensively utilized and communicated over Internet. Due to the use of public networks for communication, the multimedia data are prone to various security attacks. In the past few decades, image watermarking has been extensively utilized to handle this issue. Its main objective is to embed a watermark into a host multimedia data without affecting its presentation. However, the existing methods are not so effective against multiplicative attacks. Therefore, in this paper, a novel quantum-based image watermarking technique is proposed. It initially computes the dual-tree complex wavelet transform coefficients of an input cover image. The watermark image is then scrambled using Arnold transform. Thereafter, in the lower coefficient input the watermark image is embedded using quantum-based singular value decomposition (SVD). Finally, the covered image is obtained by applying the inverse dual-tree complex wavelet transform on the obtained coefficients. Comparative analyses are carried out by considering the proposed and the existing watermarking techniques. It has been found that the proposed technique outperforms existing watermarking techniques in terms of various performance metrics.
Style APA, Harvard, Vancouver, ISO itp.
6

Abraham, Jobin. "A Multi-purpose Dual Watermarking Scheme". International Journal of Computer Applications 77, nr 8 (18.09.2013): 1–4. http://dx.doi.org/10.5120/13411-1066.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhang, Zhengwei, Lifa Wu, Huabo Li, Haiguang Lai i Chenghui Zheng. "Dual Watermarking Algorithm for Medical Image". Journal of Medical Imaging and Health Informatics 7, nr 3 (1.06.2017): 607–22. http://dx.doi.org/10.1166/jmihi.2017.2056.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Al-Haj, Ali. "A dual transform audio watermarking algorithm". Multimedia Tools and Applications 73, nr 3 (30.08.2013): 1897–912. http://dx.doi.org/10.1007/s11042-013-1645-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Phin, Ch’ng Chen, Nurul Hidayah Ab Rahman i Noraini Che Pa. "A Digital Image Watermarking System: An Application of Dual Layer Watermarking Technique". JOIV : International Journal on Informatics Visualization 1, nr 4-2 (16.11.2017): 199. http://dx.doi.org/10.30630/joiv.1.4-2.78.

Pełny tekst źródła
Streszczenie:
Watermarking is a method to digitally sign a product to provide authentication and prevent copyright infringement to proving the ownership of a product and provides integrity for companies to protect their product. In this study, dual layer watermark that applies two different watermarking techniques at each layer is presented. The first layer applies the LSB Substitution technique while the second layer uses the Discrete Wavelet Transform (DWT) technique. This implies greater integrity as it contains of two signatures in providing authentication.
Style APA, Harvard, Vancouver, ISO itp.
10

Xi, Xu, Xinchang Zhang, Weidong Liang, Qinchuan Xin i Pengcheng Zhang. "Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition". Applied Sciences 9, nr 4 (14.02.2019): 642. http://dx.doi.org/10.3390/app9040642.

Pełny tekst źródła
Streszczenie:
Digital watermarking is important for the copyright protection of electronic data, but embedding watermarks into vector maps could easily lead to changes in map precision. Zero-watermarking, a method that does not embed watermarks into maps, could avoid altering vector maps but often lack of robustness. This study proposes a dual zero-watermarking scheme that improves watermark robustness for two-dimensional (2D) vector maps. The proposed scheme first extracts the feature vertices and non-feature vertices of the vector map with the Douglas-Peucker algorithm and subsequently constructs the Delaunay Triangulation Mesh (DTM) to form a topological feature sequence of feature vertices as well as the Singular Value Decomposition (SVD) matrix to form intrinsic feature sequence of non-feature vertices. Next, zero-watermarks are obtained by executing exclusive disjunction (XOR) with the encrypted watermark image under the Arnold scramble algorithm. The experimental results show that the scheme that synthesizes both the feature and non-feature information improves the watermark capacity. Making use of complementary information between feature and non-feature vertices considerably improves the overall robustness of the watermarking scheme. The proposed dual zero-watermarking scheme combines the advantages of individual watermarking schemes and is robust against such attacks as geometric attacks, vertex attacks and object attacks.
Style APA, Harvard, Vancouver, ISO itp.
11

Sivananthamaitrey, P., i P. Rajesh Kumar. "Multipurpose Watermarking Based on SWT and SVD". International Journal of Engineering & Technology 7, nr 3.29 (24.08.2018): 65. http://dx.doi.org/10.14419/ijet.v7i3.29.18463.

Pełny tekst źródła
Streszczenie:
Dual digital watermarking has emerged as a successful solution for copyright protection, tamper detection and localization. However, several problems related to the robustness, capacity, tampered area detection still mystifying. This paper presents a high capacity dual watermarking mechanism for digital color image. An invisible robust watermark is embedded in the Green component of the host image by using a hybrid combination of Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) for copyright protection. A fragile invisible watermark based on the Least Significant Bit (LSB) replacement approach is embedded in the Blue component of the image for tamper detection and localization. The proposed technique focuses on robustness and imperceptibility while maximizing embedding capacity that makes this technique a multipurpose watermarking scheme.
Style APA, Harvard, Vancouver, ISO itp.
12

Tumula, Sridevi. "A Novel Video Watermarking Algorithm using DTCWT". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (20.06.2021): 1629–34. http://dx.doi.org/10.22214/ijraset.2021.35324.

Pełny tekst źródła
Streszczenie:
In this paper a new novel color video watermarking algorithm has been proposed using Dual Tree Complex Wavelet Transform (DTCWT). Digital watermarking is an emerging technology for copyright protection for digital multimedia data. Now-a-days a lot of digital data are exchanged in the internet, so to protect the digital multimedia data, digital watermarking is used, the data may be an image or video or an audio data. The main objective of this paper is to maintain perceptivity of digital video and design a robust watermarking algorithm and maintaining the tradeoff between robustness and perceptivity.
Style APA, Harvard, Vancouver, ISO itp.
13

Rangel-Espinoza, Kevin, Eduardo Fragoso-Navarro, Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake i Héctor M. Pérez-Meana. "Adaptive removable visible watermarking technique using dual watermarking for digital color images". Multimedia Tools and Applications 77, nr 11 (19.06.2017): 13047–74. http://dx.doi.org/10.1007/s11042-017-4931-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Kwitt, Roland, Peter Meerwald i Andreas Uhl. "Blind Detection of Additive Spread-Spectrum Watermarking in the Dual-Tree Complex Wavelet Transform Domain". International Journal of Digital Crime and Forensics 2, nr 2 (kwiecień 2010): 34–46. http://dx.doi.org/10.4018/jdcf.2010040103.

Pełny tekst źródła
Streszczenie:
In this paper, the authors adapt two blind detector structures for additive spread-spectrum image watermarking to the host signal characteristics of the Dual-Tree Complex Wavelet Transform (DT-CWT) domain coefficients. The research is motivated by the superior perceptual characteristics of the DT-CWT and its active use in watermarking. To improve the numerous existing watermarking schemes in which the host signal is modeled by a Gaussian distribution, the authors show that the Generalized Gaussian nature of Dual-Tree detail subband statistics can be exploited for better detector performance. This paper finds that the Rao detector is more practical than the likelihood-ratio test for their detection problem. The authors experimentally investigate the robustness of the proposed detectors under JPEG and JPEG2000 attacks and assess the perceptual quality of the watermarked images. The results demonstrate that their alterations allow significantly better blind watermark detection performance in the DT-CWT domain than the widely used linear-correlation detector. As only the detection side has to be modified, the proposed methods can be easily adopted in existing DT-CWT watermarking schemes.
Style APA, Harvard, Vancouver, ISO itp.
15

Reyes-Ruiz, Laura, duardo Fragoso-Navarro, Francisco Garcia-Ugalde, Oswaldo Juarez-Sandoval, Manuel Cedillo-Hernandez i Mariko Nakano-Miyatake. "Robust Dual Digital Watermark Applied to Antique Digitized Cinema Images: Resistant to Print-Scan Attack". Journal of Image and Graphics 11, nr 1 (marzec 2023): 61–71. http://dx.doi.org/10.18178/joig.11.1.61-71.

Pełny tekst źródła
Streszczenie:
Nowadays, advances in information and communication technologies along with easy access to electronic devices such as smartphones have achieved an agile and efficient storing, edition, and distribution of digital multimedia files. However, lack of regulation has led to several problems associated with intellectual property authentication and copyright protection. Furthermore, the problem becomes complex in a scenario of illegal printed exploitation, which involves printing and scanning processes. To solve these problems, several digital watermarking in combination with cryptographic algorithms has been proposed. In this paper, a strategy of robust watermarking is defined consisting of the administration and detection of unauthorized use of digitized cinematographic images from Mexican cultural heritage. The proposed strategy is based on the combination of two types of digital watermarking, one of visible-camouflaged type based on spatial domain and another of invisible type based on frequency domain, together with a particle swarm optimization. The experimental results show the high performance of the proposed algorithm faced to printing-scanning processes or digital-analogue attack, and common image geometric and image processing attacks such as JPEG compression. Additionally, the imperceptibility of the watermark is evaluated by PSNR and compared with other previously proposed algorithms.
Style APA, Harvard, Vancouver, ISO itp.
16

MINAMOTO, TERUYA, i RYUJI OHURA. "A DIGITAL IMAGE WATERMARKING FOR AUTHENTICATION BASED ON THE DUAL-TREE COMPLEX DISCRETE WAVELET TRANSFORM AND INTERVAL ARITHMETIC". International Journal of Wavelets, Multiresolution and Information Processing 11, nr 04 (lipiec 2013): 1360005. http://dx.doi.org/10.1142/s0219691313600059.

Pełny tekst źródła
Streszczenie:
We propose a new digital image watermarking method for authentication based on the dual-tree complex discrete wavelet transform (DT-CDWT) and interval arithmetic (IA). This method is a kind of content-based watermarking, because it generates a watermark from the host image and authenticates the test image by comparing two types of watermarks constructed using the test image. We describe our watermarking and authentication procedure in detail and present experimental results demonstrating that our method produces high-quality watermarked images and can locate the areas that have been tampered with.
Style APA, Harvard, Vancouver, ISO itp.
17

Mathur, Etti, i Manish Mathuria. "Review of Dual Watermarking on Digital Image". International Journal of Computer Applications 163, nr 9 (17.04.2017): 11–13. http://dx.doi.org/10.5120/ijca2017913733.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Bhardwaj, Swapnil, Kirat Chabra, Madhurima i Saru Dhir. "Dual Watermarking Technique for Protection of Images". Indian Journal of Public Health Research & Development 10, nr 5 (2019): 857. http://dx.doi.org/10.5958/0976-5506.2019.01189.6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

INAMDAR, VANDANA S., i PRITI P. REGE. "Dual watermarking technique with multiple biometric watermarks". Sadhana 39, nr 1 (luty 2014): 3–26. http://dx.doi.org/10.1007/s12046-013-0208-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Shi, Yanjiao, Miao Qi, Yugen Yi, Ming Zhang i Jun Kong. "Object based dual watermarking for video authentication". Optik 124, nr 19 (październik 2013): 3827–34. http://dx.doi.org/10.1016/j.ijleo.2012.11.078.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Fan, Yu Cheng, i Hen Wai Tsao. "A dual pyramid watermarking for JPEG-2000". International Journal of High Performance Computing and Networking 5, nr 1/2 (2007): 84. http://dx.doi.org/10.1504/ijhpcn.2007.015767.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Wang, Yuan-Gen, Zhe-Ming Lu, Liang Fan i Yun Zheng. "Robust dual watermarking algorithm for AVS video". Signal Processing: Image Communication 24, nr 4 (kwiecień 2009): 333–44. http://dx.doi.org/10.1016/j.image.2009.03.004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Huang, Tongyuan, Jia Xu, Yuling Yang i Baoru Han. "Robust Zero-Watermarking Algorithm for Medical Images Using Double-Tree Complex Wavelet Transform and Hessenberg Decomposition". Mathematics 10, nr 7 (2.04.2022): 1154. http://dx.doi.org/10.3390/math10071154.

Pełny tekst źródła
Streszczenie:
With the rapid development of smart medical care, copyright security for medical images is becoming increasingly important. To improve medical images storage and transmission safety, this paper proposes a robust zero-watermarking algorithm for medical images by fusing Dual-Tree Complex Wavelet Transform (DTCWT), Hessenberg decomposition, and Multi-level Discrete Cosine Transform (MDCT). First, the low-frequency sub-band of the medical image is obtained through the DTCWT and MDCT. Then Hessenberg decomposition is used to construct the visual feature vector. Meanwhile, the encryption of the watermarking image by combining cryptographic algorithms, third-party concepts, and chaotic sequences enhances the algorithm’s security. In the proposed algorithm, zero-watermarking technology is utilized to assure the medical images’ completeness. Compared with the existing algorithms, the proposed algorithm has good robustness and invisibility and can efficiently extract the watermarking image and resist different attacks.
Style APA, Harvard, Vancouver, ISO itp.
24

Liu, Feng. "A Dual-Watermarking Scheme Robust to Affine Transformation". Journal of Physics: Conference Series 1856, nr 1 (1.04.2021): 012062. http://dx.doi.org/10.1088/1742-6596/1856/1/012062.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Jing Li, i Mingxia Shi. "Dual Zero-Watermarking Scheme for Image Copyright Protection". INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, nr 7 (15.04.2013): 372–80. http://dx.doi.org/10.4156/aiss.vol5.issue7.44.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
26

Yinglan, Fang, Han Bing, Zhang Yongmei i Tian Lin. "RESEARCH OF DUAL WATERMARKING TECHNOLOGY FOR DIGITAL IMAGE". International Journal on Smart Sensing and Intelligent Systems 9, nr 4 (2016): 2167–85. http://dx.doi.org/10.21307/ijssis-2017-958.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Jin, C., Z. G. Qu, Z. M. Zhang i Y. Jiang. "Web dual watermarking technology using an XML document". IET Information Security 1, nr 1 (2007): 37. http://dx.doi.org/10.1049/iet-ifs:20060083.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Song, Chunlin, Sud Sudirman i Madjid Merabti. "A robust region-adaptive dual image watermarking technique". Journal of Visual Communication and Image Representation 23, nr 3 (kwiecień 2012): 549–68. http://dx.doi.org/10.1016/j.jvcir.2012.01.017.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Kumar, Chandan, Amit Kumar Singh i Pardeep Kumar. "Dual watermarking: An approach for securing digital documents". Multimedia Tools and Applications 79, nr 11-12 (23.12.2019): 7339–54. http://dx.doi.org/10.1007/s11042-019-08314-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Singh, Amit Kumar, Basant Kumar, Mayank Dave i Anand Mohan. "Robust and Imperceptible Dual Watermarking for Telemedicine Applications". Wireless Personal Communications 80, nr 4 (30.09.2014): 1415–33. http://dx.doi.org/10.1007/s11277-014-2091-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Mahala, Santanu, Biswapati Jana i Abuzar Mahammad. "Dual Image Based Watermarking Scheme for Image Authentication". International Journal of Renewable Energy Exchange 10, nr 11 (21.11.2022): 136–43. http://dx.doi.org/10.58443/ijrex.10.11.2022.136-143.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Bamal, Roopam, i Singara Singh Kasana. "Dual hybrid medical watermarking using walsh-slantlet transform". Multimedia Tools and Applications 78, nr 13 (15.01.2019): 17899–927. http://dx.doi.org/10.1007/s11042-018-6820-9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

SADH, ROOPAM, NISHCHOL MISHRA i SANJEEV SHARMA. "Dual plane multiple spatial watermarking with self-encryption". Sadhana 41, nr 1 (styczeń 2016): 1–14. http://dx.doi.org/10.1007/s12046-015-0458-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Shi, Hui, Ming-chu Li, Cheng Guo i Ru Tan. "A region-adaptive semi-fragile dual watermarking scheme". Multimedia Tools and Applications 75, nr 1 (17.10.2014): 465–95. http://dx.doi.org/10.1007/s11042-014-2301-y.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Qian, Qing, Hong-Xia Wang, Yi Hu, Lin-Na Zhou i Jin-Feng Li. "A dual fragile watermarking scheme for speech authentication". Multimedia Tools and Applications 75, nr 21 (8.08.2015): 13431–50. http://dx.doi.org/10.1007/s11042-015-2801-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Mokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh i D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images". Contrast Media & Molecular Imaging 2022 (8.09.2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.

Pełny tekst źródła
Streszczenie:
In the modern era of virtual computers over the notional environment of computer networks, the protection of influential documents is a major concern. To bring out this motto, digital watermarking with biometric features plays a crucial part. It utilizes advanced technology of cuffing data into digital media, i.e., text, image, video, or audio files. The strategy of cuffing an image inside another image by applying biometric features namely signature and fingerprint using watermarking techniques is the key purpose of this study. To accomplish this, a combined watermarking strategy consisting of Discrete Wavelet Transform, Discrete Cosine Transform, and Singular Value Decomposition (DWT-DCT-SVD) is projected for authentication of image that is foolproof against attacks. Here, singular values of watermark1 (fingerprint) and watermark2 (signature) are obtained by applying DWT-DCT-SVD. Affixing both the singular values of watermarks, we acquire the transformed watermark. Later, the same is applied to cover image to extract the singular values. Then we add these values to the cover image and transformed watermark to obtain a final watermarked image containing both signature and fingerprint. To upgrade the reliability, sturdiness, and originality of the image, a fusion of watermarking techniques along with dual biometric features is exhibited. The experimental results conveyed that the proposed scheme achieved an average PSNR value of about 40 dB, an average SSIM value of 0.99, and an embedded watermark resilient to various attacks in the watermarked image.
Style APA, Harvard, Vancouver, ISO itp.
37

Chen, Sheng, Xianyi Chen i Huijuan Fu. "General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error". Advances in Multimedia 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/6359248.

Pełny tekst źródła
Streszczenie:
This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error. Different from the conventional algorithms using single-prediction scheme to create symmetric histogram, the proposed method employs a multi-prediction scheme, which calculates multiple prediction values for the pixels. Then, the suitable value would be selected by two dual asymmetric selection functions to construct two asymmetric error histograms. Finally, the watermark is embedded in the two error histograms separately utilizing a complementary embedding strategy. The proposed framework provides a new perspective for the research of reversible watermarking, which brings about many benefits for the information security.
Style APA, Harvard, Vancouver, ISO itp.
38

Padma, U. R., i Jayachitra. "SELF-EMBEDDING VIDEO WATERMARKING USING DUAL ORTHOGONAL COMPLEX CONTOURLET TRANSFORM WITH AUTOCORRELATION SYSTEM". International Journal of Research -GRANTHAALAYAH 3, nr 4 (30.04.2015): 89–98. http://dx.doi.org/10.29121/granthaalayah.v3.i4.2015.3025.

Pełny tekst źródła
Streszczenie:
This paper presents a novel non-blind watermarking algorithm using dual orthogonal complex contourlet transform. The dual orthogonal complex contourlet transform is preferred for watermarking because of its ability to capture the directional edges and contours superior to other transforms such as cosine transform, wavelet transform, etc. Digital image and video in their raw form require an enormous amount of storage capacity and the huge data systems also contain a lot of redundant information.Compression also increases the capacity of the communication channel. Image Compression using SPIHT Set Partitioning in Hierarchical Trees algorithm based on Huffman coding technique. SPIHT algorithm is the lossless compression algorithms reduce file size with no loss in image quality and comparing the final results in terms of bit error rate, PSNR and MSE.
Style APA, Harvard, Vancouver, ISO itp.
39

Wahyu Adi, Prajanto, Farah Zakiyah Rahmanti i Edy Winarno. "Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem". Bulletin of Electrical Engineering and Informatics 7, nr 4 (1.12.2018): 561–69. http://dx.doi.org/10.11591/eei.v7i4.690.

Pełny tekst źródła
Streszczenie:
CRT was a widely used algorithm in the development of watermarking methods. The algorithm produced good image quality but it had low robustness against compression and filtering. This paper proposed a new watermarking scheme through dual band IWT to improve the robustness and preserving the image quality. The high frequency sub band was used to index the embedding location on the low frequency sub band. In robustness test, the CRT method resulted average NC value of 0.7129, 0.4846, and 0.6768 while the proposed method had higher NC value of 0.7902, 0.7473, and 0.8163 in corresponding Gaussian filter, JPEG, and JPEG2000 compression test. Meanwhile the both CRT and proposed method had similar average SSIM value of 0.9979 and 0.9960 respectively in term of image quality. The result showed that the proposed method was able to improve the robustness and maintaining the image quality.
Style APA, Harvard, Vancouver, ISO itp.
40

Singh, Ranjeet Kumar, i Dilip Kumar Shaw. "A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security". International Journal of Information Security and Privacy 12, nr 1 (styczeń 2018): 1–12. http://dx.doi.org/10.4018/ijisp.2018010101.

Pełny tekst źródła
Streszczenie:
Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.
Style APA, Harvard, Vancouver, ISO itp.
41

Nawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Anum Mehmood, Raza Ahmed, Zeeshan i Qurat Ul Ain. "A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm". Journal of Medical Imaging and Health Informatics 10, nr 11 (1.11.2020): 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.

Pełny tekst źródła
Streszczenie:
With the advancement of networks and multimedia, digital watermarking technology has received worldwide attention as an effective method of copyright protection. Improving the anti-geometric attack ability of digital watermarking algorithms using image feature-based algorithms have received extensive attention. This paper proposes a novel robust watermarking algorithm based on SURF-DCT perceptual hashing (Speeded Up Robust Features and Discrete Cosine Transform), namely blind watermarking. We design and implement a meaningful binary watermark embedding and extraction algorithm based on the SURF feature descriptor and discrete-cosine transform domain digital image watermarking algorithm. The algorithm firstly uses the affine transformation with a feature matrix and chaotic encryption technology to preprocess the watermark image, enhance the confidentiality of the watermark, and perform block and DCT coefficients extraction on the carrier image, and then uses the positive and negative quantization rules to modify the DCT coefficients. The embedding of the watermark is completed, and the blind extraction of the watermark realized. Correlation values are more than 90% in most of the attacks. It provides better results against different noise attacks and also better performance against rotation. Transparency and high computational efficiency, coupled with dual functions of copyright protection and content authentication, is the advantage of the proposed algorithm.
Style APA, Harvard, Vancouver, ISO itp.
42

YE Tianyu, 叶天语. "A Selfembedding Image Watermarking Scheme with Dual Purpose". ACTA PHOTONICA SINICA 41, nr 7 (2012): 859–67. http://dx.doi.org/10.3788/gzxb20124107.0859.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

YE Tianyu, 叶天语. "A Selfembedding Image Watermarking Scheme with Dual Purpose". ACTA PHOTONICA SINICA 41, nr 7 (2012): 859–67. http://dx.doi.org/10.3788/gzxb20124107.859.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Hu, Hwai-Tsu, i Wei-Hsi Chen. "A dual cepstrum-based watermarking scheme with self-synchronization". Signal Processing 92, nr 4 (kwiecień 2012): 1109–16. http://dx.doi.org/10.1016/j.sigpro.2011.11.001.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Hu, Ming-Chiang, Der-Chyuan Lou i Ming-Chang Chang. "Dual-wrapped digital watermarking scheme for image copyright protection". Computers & Security 26, nr 4 (czerwiec 2007): 319–30. http://dx.doi.org/10.1016/j.cose.2006.11.007.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Tang, Lin-Lin, Chun Ta Huang, Jeng-Shyang Pan i Chang-Yong Liu. "Dual watermarking algorithm based on the Fractional Fourier Transform". Multimedia Tools and Applications 74, nr 12 (8.06.2013): 4397–413. http://dx.doi.org/10.1007/s11042-013-1531-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Mo, Jia, Zhaofeng Ma, Yixian Yang i Xinxin Niu. "A Quantum Watermarking Protocol Based on Bell Dual Basis". International Journal of Theoretical Physics 52, nr 11 (19.06.2013): 3813–19. http://dx.doi.org/10.1007/s10773-013-1687-z.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Nan, Hai, Bin Fang, Weibin Yang, Jiye Qian, Ming Li, Yi Liu i Yushu Zhang. "Cryptanalysis and Improvement of the Robust and Blind Watermarking Scheme for Dual Color Image". Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/526174.

Pełny tekst źródła
Streszczenie:
With more color images being widely used on the Internet, the research on embedding color watermark image into color host image has been receiving more attention. Recently, Su et al. have proposed a robust and blind watermarking scheme for dual color image, in which the main innovation is the using of two-level DCT. However, it has been demonstrated in this paper that the original scheme in Su’s study is not secure and can be attacked by our proposed method. In addition, some errors in the original scheme have been pointed out. Also, an improvement measure is presented to enhance the security of the original watermarking scheme. The proposed method has been confirmed by both theoretical analysis and experimental results.
Style APA, Harvard, Vancouver, ISO itp.
49

Liu, Jing, Jingbing Li, Jixin Ma, Naveed Sadiq, Uzair Bhatti i Yang Ai. "A Robust Multi-Watermarking Algorithm for Medical Images Based on DTCWT-DCT and Henon Map". Applied Sciences 9, nr 4 (18.02.2019): 700. http://dx.doi.org/10.3390/app9040700.

Pełny tekst źródła
Streszczenie:
To resolve the contradiction between existing watermarking methods—which are not compatible with the watermark’s ability to resist geometric attacks—and robustness, a robust multi-watermarking algorithm suitable for medical images is proposed. First, the visual feature vector of the medical image was obtained by dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) to perform multi-watermark embedding and extraction. Then, the multi-watermark was preprocessed using the henon map chaotic encryption technology to strengthen the security of watermark information, and combined with the concept of zero watermark to make the watermark able to resist both conventional and geometric attacks. Experimental results show that the proposed algorithm can effectively extract watermark information; it implements zero watermarking and blind extraction. Compared with existing watermark technology, it has good performance in terms of its robustness and resistance to geometric attacks and conventional attacks, especially in geometric attacks.
Style APA, Harvard, Vancouver, ISO itp.
50

Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra, Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra. "A Fuzzy Controlled Image Watermarking Based on a Dual Transform Technique". journal of king abdulaziz university computing and information technology sciences 5, nr 1 (27.05.2016): 83–92. http://dx.doi.org/10.4197/comp.5-1.6.

Pełny tekst źródła
Streszczenie:
This paper presents a new watermarking technique using hybrid image transforms that aims to be very robust against attacks. It also aims to reduce the amount of distortion created from embedding the watermark as much as possible, and have good capacity. The proposed system uses a hybrid watermarking technique that is based on Non-Subsampled Contourlet Transform and Discrete Wavelet Transform. In addition, the proposed system makes use of the fuzzy logic to automatically choose the strength of the embedded watermark. Furthermore, the system uses Spread Spectrum Code Division Multiple Access to embed and recover the watermark after transforming the image. To enhance recoverability of the watermarks, the system uses a high level of redundancy in the embedding process, which allows a powerful Error Correcting Code to be used in the recovery process. The fuzzy logic is used to help the system in producing watermarked images that reserve their quality and not be heavily altered after embedding the watermark. Experiments were performed to measure the quality of the proposed system using JPEG compression attacks. The results showed that the proposed system is robust and has good capacity and imperceptibly although it suffers from being computationally complex.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii