نتایج جستجو برای: watermark 200ss
تعداد نتایج: 3536 فیلتر نتایج به سال:
Digital watermarking is referred to a method used for copyright protection and authentication. In this paper, we present a method of nested digital watermark embedding and extraction in which a nested watermark (a watermark inside another watermark) is embedded into the main image. This concept of nested watermarking is used to increase the watermark embedding capacity. In this method, a waterm...
For most watermarking methods, preserving the synchronization between the watermark embedded in a digital data (image, audio or video) and the watermark detector is critical to the success of the watermark detection process. Many digital watermarking attacks exploit this fact by disturbing the synchronization of the watermark and the watermark detector, and thus disabling proper watermark detec...
For most watermarking methods, preserving the synchronization between the watermark embedded in digital data (image, audio or video) and the watermark detector is critical to the success of the watermark detection process. Many digital watermarking attacks exploit this fact by disturbing the synchronization of the watermark and the watermark detector, and thus disabling proper watermark detecti...
On hand watermark methods employ selective Neural Network techniques for watermark embedding efficiently. Similarity Based Superior Self Organizing Maps (SBS_SOM) a neural network algorithm for watermark generation. Host image is learned by the SBS_SOM neurons and the very fine RGB feature values are mined as digital watermark. Discrete Wavelet Transform (DWT) is used for watermark entrench. Si...
Watermark technology has been developed to tackle the problem of unauthorized copying and distribution of digital data. Several different schemes have been proposed in the last few years, but most of them are symmetric, i.e., the key used for watermark embedding is just the same used for watermark detection. However, in many applications, an asymmetric scheme is needed, where the secrete inform...
digital preservation refers to an important aspect that most iranian digital library initiatives lack. this component is security. while a digital library may be misconceived as an information supply space without a physical form, the same security concerns in force for operation of physical library are valid. unlike the analog materials, all digital copies of digital materials are original. a ...
Along with the development of the watermark technique many new scheme were presented and most of them were proved efficient. Some researchers have presented extraction of audio watermark using ICA in spatial domain. In this paper, we present a wavelet audio watermark using ICA. We embedded the image watermark into the wavelet coefficient of the audio signal, and extracted the watermark image us...
Although many watermarking schemes consider the case of universal verifiability, it is undesirable in some applications. Designated verification is a possible solution for this problem. Watermarking scheme with (non-interactive) designated verification through non-invertible schemes was proposed by Lee et al [11] in 2003, to resolve multiple watermarking problem. Yoo et al [14] proposed a very ...
The eigenvalues decomposition based on the S-method is employed to extract the specific time-frequency characteristics of speech signals. This approach is used to create a flexible speech watermark, shaped according to the time-frequency characteristics of the host signal. Also, the Hermite projection method is applied for characterization of speech regions. Namely, time-frequency regions that ...
Abstract Multimedia security is extremely significant concern for the internet technology because of ease duplication, distribution and manipulation multimedia data. The digital watermarking a field information hiding which hide crucial in original data protection illegal duplication This paper presents survey on existing image techniques. In secret are implanted into protecting ownership right...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید