نتایج جستجو برای: text watermarking

تعداد نتایج: 172435  

2015
Rubal Jain Arun Kumar Yadav

In the present scenario, data security is one of the major challenges. Watermarking is a technique in which a digital signal or pattern is inserted into a digital image for security reasons. Watermarking is mainly used for copyright protection, owner authentication and id card security. A watermark is a signal added to digital data such as audio, video and still images that can be detected or e...

2012
Deepak Prashar

399 Abstract:Digital Watermarking is a process of embedding unnoticeable signal in an image in the form of text and image in such a way that intruder is no able to trace the signal to enhance Copyright Protection. This Paper presents an efficient Watermarking Technique for Digital Media Content Protection and Copyright Protection. Watermarking is a technique to embed hidden and unnoticeable sig...

Journal: :I. J. Network Security 2016
Lamri Laouamer Omar Tayan

Addressing fraud and illegal use of multimedia requires the development of more powerful and robust algorithms. One of the solutions that can contribute significantly to solve such problems can be found in the use of image watermarking. In image watermarking, a watermark is introduced within an image in order to protect it against illegal use. This paper proposes a new hybrid text-image waterma...

2010
Zunera Jalil M. Arfan Jaffar Anwar M. Mirza

Authentication and copyright protection of information contents has always been a concern in print media. The problem has become more critical with the increasing use of the Internet and digital technologies. Besides image, audio and video, the text is most extensively used medium travelling over the Internet. Digital libraries offer a quick and easy access to information such as e-books, archi...

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...

Journal: :modeling and simulation in electrical and electronics engineering 2015
farzin yaghmaee mansour jamzad

one of the most important parameters in evaluating a watermarking algorithm is its capacity. generally, watermarking capacity is expressed by bits per pixel (bpp) unit measure. but this measure does not show what the side effects would be on image quality, watermark robustness and capacity. in this paper we propose a three dimensional measure named capacity surface which shows the effects of ca...

Journal: :EURASIP J. Adv. Sig. Proc. 2002
Mauro Barni Franco Bartolini Alessandro Piva Filippo Salucco

We present a method (Text-Based Geometric Normalization—TBGN) which, by exploiting the particular content of cartographic images, namely text content, permits to cope with global geometric transformations. First, text is extracted from the to-be-marked map, then text orientation and size are exploited to normalize the image geometry prior to watermark insertion. Watermarking is performed by mea...

Journal: :International Journal of Information Technology 2023

With the growing popularity of Internet, digital images are used and transferred more frequently. Although this phenomenon facilitates easy access to information, it also creates security concerns violates intellectual property rights by allowing illegal use, copying, content theft. Using watermarks in is one most common ways maintain security. Watermarking proving declaring ownership an image ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید