نتایج جستجو برای: text watermarking

تعداد نتایج: 172435  

2016
Fang Yinglan Tian Lin

Digital image watermark has been studied as object. It analyzed the typical digital watermark algorithms based on the space domain and transform domain and key researched watermarking algorithm based on discrete wavelet transform. It has designed and improved blind watermarking algorithm and color image watermarking algorithm. Finally, based on the two improved watermarking algorithm, it has de...

2013
Jennifer Ranjani

Watermarking is closely related to steganography but in watermarking the hidden data is usually related to cover image. In this paper discussed about algorithms for rotation, scaling and translation (RST) invariant image watermarking. There are mainly two categories of RST invariant image watermarking algorithms. Then, we discuss about various algorithm used for RST invariant image watermarking.

Journal: :isecure, the isc international journal of information security 0
n. zarmehi electrical engineering department, sharif university of technology, tehran, iran advanced communications research institute, sharif university of technology, tehran, iran m. r. aref electrical engineering department, sharif university of technology, tehran, iran information systems and security lab. (issl), electrical engineering department, sharif university of technology, tehran, iran

this paper investigates the multiplicative spread spectrum watermarking method for the image. the information bit is spreaded into middle-frequency discrete cosine transform (dct) coefficients of each block of an image using a generated pseudo-random sequence. unlike the conventional signal modeling, we suppose that both signal and noise are distributed with laplacian distribution, because the ...

Journal: :Inf. Sci. 2014
Asifullah Khan Ayesha Siddiqa Summuyya Munib Sana Ambreen Malik

 1 Abstract— The art of secretly hiding and communicating information has gained immense importance in the last 2 two decades due to the advances in generation, storage, and communication technology of digital content. 3 Watermarking is one of the promising solutions for tamper detection and protection of digital content. However, 4 watermarking can cause damage to the sensitive information pr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

abstract although music possesses some kind of power and using it has been welcome by many students in language classrooms, it seems that they take a non-serious image of the lesson while listening to songs and they may think that it is a matter of fun. the main objective of the present study was to investigate whether learning a foreign language through musical texts (songs) can have an impac...

2009
Xi Zhao Steve Schneider

......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...

2008
Xin Li Yonatan Shoshan Alexander Fish Graham Jullien Orly Yadid-Pecht

Various digital watermarking (WM) techniques for still imaging have been studied in the last several years. Recently, many new WM schemes have been proposed for other types of digital multimedia data, such as text, audio and video. This paper presents a brief overview of existing digital video WM. We classify WM techniques and discuss the properties of video WM. Since each WM application has it...

Journal: :IEEE Trans. Multimedia 2002
Ruizhen Liu Tieniu Tan

Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. There are two important issues that watermarking algorithms need to address. Firstly, watermarking schemes are required to provide trustworthy evidence for protecting rightful ownership; Secondly, good watermarking schemes should satisfy the requirement ...

2013
Indrasena Reddy V. Uday Kumar K. Subba Reddy William Stallings W. H. Tsai Rafael C. Gonzalez Richard E. Woods

Steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. In the discrete wavelet transform, an image signal can be analyzed by passing it through an analysis filter bank. This analysis filter bank consists of a low pass and a high pass filter at each decomposition stage. Another technology, the digital water...

2016
Mehdi Khalili Mahsa Nazari

There are two digital watermarking techniques. Digital watermarking techniques based on correlation and digital watermarking techniques that are not based on correlation. In previous work, we proposed a DWT2 based CDMA image watermarking scheme to study the effects of using eight color spaces RGB, YCbCr, JPEG-YCbCr, YIQ, YUV, HSI, HSV and CIELab, on watermarking algorithms based on correlation ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید