نتایج جستجو برای: watermarking capacity

تعداد نتایج: 284008  

Journal: :EURASIP Journal on Advances in Signal Processing 2010

2008
Akio Ogihara Naoya Inoue Motoi Iwata Akira Shiozaki

Because digital audio data is not deteriorated by copying, its illegal reproduction can be easily made. Recently, copyright infringement becomes a social problem such as the illegal reproduction is distributed on the Internet. Hence, the audio watermarking methods, techniques to embed proprietary data into dagital audio data, have attached attention as a prevention technique against the copyrig...

Journal: :iranian journal of medical physics 0
m. s. nambakhsh m. sc. in biomedical engineering, tehran university of medical sciences, tehran, iran. a. ahmadian assistant professor, physics and biomedical engineering dept., tehran university of medical sciences, tehran, iran. research center for science & technology in medicine, imam khomeini hospital, tehran, iran. m. ghavami reader in uwb communications, king’s college london, university of london, center of telecommunications research, london, uk. r. dilmaghani lecturer in uwb communications, king's college london, university of london, center of telecommunications research, london, uk.

introduction:in this study, ecg signals have been embedded into medical images to create a novel blind watermarking method. the embedding is done when the original image is compressed using the ezw algorithm. the extraction process is performed at the decompression time of the watermarked image. materials and methods: the multi-resolution watermarking with a secret key algorithm developed in th...

2014
Ramandeep Kaur Amandeep Kaur

This paper presents a hybrid image watermarking technique for data hiding on high entropy areas of an image. The basic idea of proposed technique is based on embedding of watermark in original image using hybrid DWT SVD watermarking algorithm to produce watermarked image. Then performance of proposed algorithm will be analyzed and compared with existing DWT SVD technique which has been applied ...

Journal: :CoRR 2010
Er. Deepak Aggarwal Er. Sandeep Kaur Er. Anantdeep

Capacity, Robustness, & Perceptual quality of watermark data are very important issues to be considered. A lot of research is going on to increase these parameters for watermarking of the digital images, as there is always a tradeoff among them. . In this paper an efficient watermarking algorithm to improve payload and robustness without affecting perceptual quality of image data based on DWT i...

2010
Marc Chaumont

→ Security weakness (Kerckhoffs's framework). Code book estimable on a simplified version [2]. → High computational complexity of the Embedding part Lin et al. [3] solution is not enough satisfying in term of robustness-distortion tradeoff. → DCT artifacts. [1] “Applying Informed Coding and Informed Embedding to Design a Robust, High Capacity Watermark”, Miller, Doërr, and Cox, IEEE TIP 2004. [...

Journal: :Soft Comput. 2009
Hsiang-Cheh Huang Chi-Ming Chu Jeng-Shyang Pan

Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches. Based on existing experiences to evaluate the applicability of robust watermarking, it is generally agreed that three parameters or requirements, including the quality of watermarked contents, the survivability of extracted watermark after deliberate or unintentio...

2007
Mahsa Eshraghi Faramarz F. Samavati

In this paper we propose a new watermarking approach for 3D polygonal meshes. In the field of multimedia watermarking, mesh watermarking is less advanced than image or video. The main difficulty is due to the irregular structure of 3D meshes that makes them more vulnerable to attacks. To address this issue, we introduce a new criterion -accessibility in the common 3D graphics software-for selec...

2002
Aria Nosratinia Vimal Thilak

Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been recognized. The bandwidth limit is due to the lowpass spectrum of images and possible lowpass attacks (malicious or unintentional). This is related to the concept of channel capacity, and has only recently been addressed ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید