|
|
|
Can Li, Hua Sun, Changhong Wang, Sheng Chen, Xi Liu, Yi Zhang, Na Ren and Deyu Tong
In order to safeguard image copyrights, zero-watermarking technology extracts robust features and generates watermarks without altering the original image. Traditional zero-watermarking methods rely on handcrafted feature descriptors to enhance their per...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Jose Juan Garcia-Hernandez, Claudia Feregrino-Uribe, Alejandra Menendez-Ortiz and Dan Williams Robledo-Cruz
In the literature, robust reversible watermarking schemes (RWSs) allow the extraction of watermarks after the images have suffered attacks; however, the modified images are compromised. On the other hand, self-recovery schemes will restore the compromise...
ver más
|
|
|
|
|
|
|
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo...
ver más
|
|
|
|
|
|
|
Mahbuba Begum and Mohammad Shorif Uddin
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Base...
ver más
|
|
|
|
|
|
|
Hongmei Liu, Jinhua Liu and Mingfeng Zhao
To improve the invisibility and robustness of the multiplicative watermarking algorithm, an adaptive image watermarking algorithm is proposed based on the visual saliency model and Laplacian distribution in the wavelet domain. The algorithm designs an ad...
ver más
|
|
|
|
|
|
|
Heng Zhang, Chengyou Wang and Xiao Zhou
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob...
ver más
|
|
|
|
|
|
|
J. L. Divya Shivani and Ranjan K. Senapati
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio...
ver más
|
|
|
|
|
|
|
Trung Duy Pham,Dat Tran,Wanli Ma
In the biomedical and healthcare fields, the ownership protection of the outsourced data is becoming a challenging issue in sharing the data between data owners and data mining experts to extract hidden knowledge and patterns. Watermarking has been prove...
ver más
|
|
|
|
|
|
|
Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang; Jiwu Huang
Pág. 1956 - 1966
|
|
|
|