SECURING OF IMAGES FROM UNAUTHORIZED USE BASED ON QUANTIZATION INDEX MODULATION
نویسندگان
چکیده
منابع مشابه
A Survey on Securing Databases From Unauthorized Users
Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...
متن کاملAudio Watermarking Based on Wavelet Transform and Quantization Index Modulation
In this paper, we present a technique for embedding digital watermarks into digital audio signals. Watermarking is a technique used to label digital media by hiding copyright or other information in the underlying data. In the case of digital audio, the main constraint is the tradeoff between robustness and imperceptibility, as hearing is one of the most sensitive human senses. In our method, t...
متن کاملMultiple Description Watermarking Based on Quantization Index Modulus Modulation
MIIN-LUEN DAY, SUH-YIN LEE AND I-CHANG JOU Department of Computer Science and Information Engineering National Chiao Tung University Hsinchu, 300 Taiwan E-mail: [email protected] Telecommunication Laboratory Chunghwa Telecom Co., Ltd. Chungli, 320 Taiwan E-mail: [email protected] Department of Computer and Communication Engineering National Kaohsiung First University of Science and Technology...
متن کاملtranslation of collocations from english into persian, based on ghazalas theory
غزالا همایندها را به صورت ترکیبی از دو یا چند واژه که همواره در متون مختلف زبان ها همراه با هم می آیند تعریف می نماید. از دیدگاه او روند رو به رشد میل به ترجمه ی همایندها در مطالعات ترجمه، به دلیل اهمیت آنها در انسجام ساختار زبان است. این پایان نامه اساسا به ترجمه ی همایندها منحصر شده است. هدف آن بررسی کاربرد راهکارهای غزالا در مورد ترجمه ی همایندها از انگلیسی به فارسی است. هدف دیگر آن یافتن پر...
15 صفحه اولProtected Framework for Securing Sensitive Information from Unauthorized Users
The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sovremennye naukoëmkie tehnologii
سال: 2023
ISSN: ['1812-7320']
DOI: https://doi.org/10.17513/snt.39725