Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Soft Computing"
DOI: 10.1007/s00500-020-04833-8
Abstract: In this digital era, illegitimate redistribution and protection of digital multimedia have to turn out to be the critical issue. Therefore, digital watermarking has been introduced for avoiding illegitimate works and also to ensure security…
read more here.
Keywords:
watermark;
video;
protection;
jaya ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
0
Published in 2018 at "Cluster Computing"
DOI: 10.1007/s10586-018-1991-8
Abstract: This paper presents a novel medical image authentication system through wavelet decomposition and particle swarm optimization (PSO). First medical image is treated with wavelet transformation and another image is treated with tent map and a…
read more here.
Keywords:
watermark;
intelligent reversible;
image;
system ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Speech Technology"
DOI: 10.1007/s10772-018-09563-9
Abstract: This work presents the modules for enhancing the security of speaker authentication by embedding the watermark in a speech signal. Speaker is authenticated by speech as well as the extracted watermark from the watermarked speech.…
read more here.
Keywords:
watermark;
work;
speech;
using speech ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Speech Technology"
DOI: 10.1007/s10772-019-09638-1
Abstract: The paper presents an improvement of the watermark extraction in speech signal watermarking. The noise added to the speech signal during transmission affects the efficiency of the watermark extraction. Removing this noise may aid to…
read more here.
Keywords:
watermark;
wiener filter;
speech signal;
watermark extraction ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-4483-6
Abstract: This paper presents a new approach to 3D mesh watermarking using consistent segmentation and mesh steganalysis. The method is blind, statistical, and highly robust to cropping attack. The primary watermarking domain is calculated by shape…
read more here.
Keywords:
watermark;
mesh steganalysis;
mesh;
mesh watermarking ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-4986-1
Abstract: In this paper, the authors have proposed a binary watermark embedding approach for protecting the copyright ownership of the gray-scale images. The proposed watermark embedding process is realized in integer wavelet transform (IWT) domain to…
read more here.
Keywords:
watermark;
image;
key matrix;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6128-9
Abstract: A novel imperceptible digital watermarking scheme in multiple transform domains is presented, where the cover image is dealt with by discrete wavelet transform (DWT), discrete cosine transform (DCT) and discrete fractional random transform (DFRNT), while…
read more here.
Keywords:
watermark;
watermarking scheme;
digital watermarking;
imperceptible digital ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6505-4
Abstract: A blind watermarking algorithm is proposed, which is based on the Discrete Cosine Transform (DCT) method. It uses Two-Dimensional Linear Discriminant Analysis (2DLDA) watermark scheme for copyright protection. During the embedding process, the color image…
read more here.
Keywords:
watermark;
color;
image;
method ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-7014-1
Abstract: The aim of this paper is to improve the reconstruction accuracy and security when adopting Compressive Sensing (CS) in watermarking algorithm. Unlike classical CS-based watermark generation method, lifting wavelet transformation, partial Hadamard matrix, and ternary…
read more here.
Keywords:
watermark;
compressive sensing;
algorithm remote;
watermarking algorithm ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Cryptography and Communications"
DOI: 10.1007/s12095-021-00517-8
Abstract: Embedding multiple watermarks into a digital object enables multiple purposes to be realized. In this paper, we present a multi-party watermark embedding framework based on frequency-hopping sequences (FHSs). In the proposed work, a certain number…
read more here.
Keywords:
watermark;
multi party;
watermark embedding;
frequency hopping ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Optik"
DOI: 10.1016/j.ijleo.2018.01.136
Abstract: Abstract This paper proposes a novel image watermarking scheme using entropy of the host and texture of the watermark images. Entropy is evaluated for the discrete wavelet transform coefficients of the host image. The subband…
read more here.
Keywords:
watermark;
entropy based;
wavelet transform;
discrete wavelet ... See more keywords