نتایج جستجو برای: watermark 200ss

تعداد نتایج: 3536  

2011
Liang Xu Huiping Guo

In this paper, a novel algorithm is proposed to protect the integrity of log files. Unlike other existing schemes, the proposed algorithm can detect and locate any malicious modifications made to the log files. Furthermore, massive deletion of continuous data can be classified and identified. Security analysis shows that the algorithm can detect modifications with high probability which is veri...

2001
Gang Qu

A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard problems. It provides desirable proof of authorship without rendering the intellectual properties useless. However, it makes the watermark detection, which is as important as watermarking, a NP-hard problem. We propose a keyles...

Journal: :IEICE Transactions 2011
Masayoshi Nakamoto Kohei Sayama Mitsuji Muneyasu Tomotaka Harano Shuichi Ohno

For copyright protection, a watermark signal is embedded in host images with a secret key, and a correlation is applied to judge the presence of watermark signal in the watermark detection. This paper treats a discrete wavelet transform (DWT)-based image watermarking method under specified false positive probability. We propose a new watermarking method to improve the detection performance by u...

2014
Monika Craig Deepak Kapgate

The watermarking of digital images, audio, video and multimedia products in general have been proposed for resolving copyright ownership and verifying originality of content .This paper studies the contribution of watermarking for developing the protection schemes. Wolfgang and Delp Algorithm (Technique) is used in case of watermark Embedding. The algorithm proposed the scheme of watermarking b...

2006
A. Makhloufi A. Ouled Zaid A. Bouallegue R. Bouallegue

There are several advantages to combine, at one end the image coding and watermark embedding scheme and at the other end, the image decoding and watermark extraction. In this paper, we present a blind watermarking approach based on quantization index modulation, incorporated in low bit rates wavelet image coder. To encode the binary message, the watermark is placed in the transformed image prio...

2005
Xin Xu Martin Tomlinson Marcel Ambroze Mohammed Ahmed

In this paper we propose a new high capacity, low energy requirement, and robust spread spectrum watermark approach for still images. This approach uses an orthogonalisation scheme to generate a set of binary spread spectrum carriers that are able to minimize the interference of the original image on the watermark information detection, so that, more than two hundred bit capacity in a one squar...

Journal: :Journal of Multimedia 2011
Ying Zeng Fenlin Liu Xiangyang Luo Chunfang Yang

A robust software watermarking scheme under which the watermark can resist against various attacks including collusion attacks is proposed based on obfuscated interpretation. The idea is to spread the watermark over the entire program by modifying instruction frequencies. The obfuscated interpretation technique is introduced into the scheme to not only hide the functionality of a given program ...

2012
Nedeljko Cvejic

A study of the obtainable watermark data rate for information hiding algorithms is presented in this paper. As the perceptual entropy for wideband monophonic audio signals is in the range of four to five bits per sample, a significant amount of additional information can be inserted into signal without causing any perceptual distortion. Experimental results showed that transform domain watermar...

2003
Charalampos Laftsidis Anastasios Tefas Nikos Nikolaidis Ioannis Pitas

In this paper, a technique for temporal embedding of a multibit watermark on an audio signal is proposed. The method is based on generating a chaotic sequence which is used for modifying the audio samples. A chaotic sequence generates the watermark, while the parameters of the embedding procedure are chosen so as to minimize the perceivable distortion of the initial signal, while preserving the...

Journal: :Computer Standards & Interfaces 2006
Jiang-Lung Liu Der-Chyuan Lou Ming-Chang Chang Hao-Kuan Tso

In this paper, a robust watermark scheme for copyright protection is proposed. By modifying the original image in transform domain and embedding a watermark in the difference values between the original image and its reference image, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain. Besides, the watermark extraction does not require the or...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید