نتایج جستجو برای: text watermarking

تعداد نتایج: 172435  

1998
Neri Merhav

steganography, watermarking, information hiding, error exponent, random coding Watermarking codes are analyzed from an informationtheoretic viewpoint as a game between an information hider and an active attacker. While the information hider embeds a secret message (watermark) in a covertext message (typically, text, image, sound, or video stream) within a certain distortion level, the attacker ...

2006
G. Gibert G. Bailly

This paper presents the virtual speech cuer built in the context of the ARTUS project aiming at watermarking hand and face gestures of a virtual animated agent in a broadcasted audiovisual sequence. For deaf televiewers that master cued speech, the animated agent can be then superimposed on demand and at the reception on the original broadcast as an alternative to subtitling. The paper presents...

2010
S. Saryazdi H. Nezamabadi A. Hakimi

A blind fragile watermarking scheme for binary image authentication is proposed. In authentication watermarking a hidden data is inserted into an image in order to detect any alterations. In the proposed method, the host binary image is first divided into non-overlapping 2 2 sub-blocks. Then, for the last position in each of the blocks, the probability of bit occurrence, conditional to differen...

2014
T. Jayamalar V. Radha

Digital video is a group of moving visual images, text and sounds. The popularity of using digital video in Internet leads to illicit copying and dispersal of content. In order to avoid this, video watermarking technique are used as a preventive measure for illegal copying of copyrighted material. In this paper, watermarking algorithm for identification of optimal frames and embedding of nested...

2009
Gaurav Gupta Himanshu Aggarwal

Abstract—In digital watermarking, a watermark is embedded into a cover text in such a way that the resulting watermarked signal is robust to certain distortion caused by either standard data processing in a friendly environment or malicious attacks in an unfriendly environment. This paper presents a digital image watermarking based on two dimensional discrete cosines transform (DCT2), two dimen...

1998
Inki Hong Miodrag Potkonjak

Recently, numerous watermarking-based techniques for intellectual property protection of DSP artifacts, such as images, compressed and uncompressed audio and video data, and text documents have been proposed. However, the applicability of all techniques proposed until now are limited to digital data and they either implicitly or explicitly exploit the imperfection of human perception to audio a...

2001
Pierre Moulin Aleksandar Ivanović

Watermarking refers to the nearly invisible embedding of a message (watermark) within a host data set such as text, audio, image, or video [1]. This embedding should be robust against possible degradations of the watermarked data, in the sense that it should be possible to reliably detect the presence of the watermark even in a degraded signal. Degradations include operations such as addition o...

2011
Wang Quan Pan Rong Tong Tong

This paper presents a new digital watermarking algorithm for color halftone images. According to the Minimal Brightness Variation Quadruples (MBVQ), this paper gets the conclusion that each pixel of color halftone image belongs to one of the five MBVQs. Based on the edge and MBVQ, this algorithm implements the watermark embedding in the halftone process. Experimental results show that the algor...

Journal: :Communications in computer and information science 2022

Abstract A watermarking technology is a kind of marker covertly embedded to identify ownership the copyright. The existing database techniques cannot automatically adapt different types data and have poor robustness. In this paper, we present new robust scheme. scheme can algorithm parameters according characteristics for numerical text-based data. We theoretically established verified experime...

Journal: :Mehran University Research Journal of Engineering and Technology 2021

Digital text is the most frequent interchange form of data that could hold sensitive information such as audit firms, banks, and educational institutes. This needs to preserve its integrity originality so it not only secure but also helps identify ownership documents. paper presents a novel invisible digital watermarking approach for exchange documents over internet. serves from last decade det...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید