• Nenhum resultado encontrado

[PDF] Top 20 A Novel Algorithm for Watermarking and Image Encryption

Has 10000 "A Novel Algorithm for Watermarking and Image Encryption" found on our website. Below are the top 20 most common "A Novel Algorithm for Watermarking and Image Encryption".

A Novel Algorithm for Watermarking and Image Encryption

A Novel Algorithm for Watermarking and Image Encryption

... in image analysis for capturing contours and fine details in ...resolution and multi directional ...points, and then local directional transform to gather the nearby edge points into contour ... See full document

10

A Novel Effective Secure and Robust CDMA Digital Image Watermarking in YUV Color Space Using DWT2

A Novel Effective Secure and Robust CDMA Digital Image Watermarking in YUV Color Space Using DWT2

... Nowadays, watermarking of images is becoming increasingly of interest in tasks such as copyright control, image identification, verification, and data hiding ...networking and high speed ... See full document

9

Chaos Image Encryption Using Transposition and Pixel Shuffling

Chaos Image Encryption Using Transposition and Pixel Shuffling

... of encryption which is using chaos. This algorithm is based on pixel scrambling where in the randomness of the chaos is made utilized to scramble the position of the ...map and again rearranged back ... See full document

7

Efficiency and Security of Some Image Encryption Algorithms

Efficiency and Security of Some Image Encryption Algorithms

... permutation and diffusion of pixel value. Maniccama and Bourbakisa (2004) have proposed a method that is based on permutation of pixels and substitution of the pixel values ...by encryption ... See full document

4

Proposed Hyperchaotic System for Image Encryption

Proposed Hyperchaotic System for Image Encryption

... proposed algorithm can successfully conceal the pure image information and also enable the deciphered image to be reconstructed back to the original image without missing any ... See full document

4

Multi-pixel Visual Cryptography for color images with Meaningful Shares

Multi-pixel Visual Cryptography for color images with Meaningful Shares

... black and white images (Basic) introduced by Naor and Shamir ...as image and encryption is performed using simple algorithm to generate n copies of shares depending on type of ... See full document

10

Image Encryption using chaos functions and fractal key

Image Encryption using chaos functions and fractal key

... of image transmission on computer networks and Internet, digital image security has been very ...to image transmission, secure and fast algorithms are required for image ... See full document

8

Inventive Cubic Symmetric Encryption System for Multimedia

Inventive Cubic Symmetric Encryption System for Multimedia

... done and the data will be returned to its former shape by using the agreed ...a novel symmetric block cipher cryptography algorithm has been illustrated and ...cube, and each cell ... See full document

7

Selective image encryption for Medical and Satellite Images

Selective image encryption for Medical and Satellite Images

... selective encryption some content of the image is ...the image. Consequently, selective encryption is sometimes called partial ...This algorithm provides security to the image ... See full document

7

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

Integral Imaging Based 3-D Image Encryption Algorithm Combined with Cellular Automata

... quality and security of reconstructed 3D image, we propose a new 3D image encryption algorithm using CII and ...proposed algorithm, a 3-D image is recorded as a 2-D ... See full document

10

CRISPR Content Correlates with the Pathogenic Potential of Escherichia coli.

CRISPR Content Correlates with the Pathogenic Potential of Escherichia coli.

... a novel spatiotemporal fuzzy based algorithm for noise filtering of image ...proposed algorithm uses adaptive weights based on a triangular membership function: Symmetrical, Continuous ...this ... See full document

16

EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

EFFICIENT ALGORITHM FOR RSA TEXT ENCRYPTION USING CUDA-C

... a novel algorithm for calculating modulo value that can process large power of numbers which otherwise are not supported by built-in data ...traditional algorithm is studied. Secondly, the ... See full document

9

A Robust Method for Image Watermarking Using Block Differencing LSB Substitution

A Robust Method for Image Watermarking Using Block Differencing LSB Substitution

... transmission and manipulation of ...use and protection against illegal use of ...privacy and security of the ...like encryption, decryption, cryptography, steganography and digital ... See full document

4

A Robust Digital Watermarking with Mixed Transform Technique for Digital Image

A Robust Digital Watermarking with Mixed Transform Technique for Digital Image

... watermark algorithm that we raised will be described, the embedded watermark size being 90x90 pixels, image format being 8 bit black and white bitmap, as shown in ...test image, and the ... See full document

4

AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

... Jalil and Mirza (2010); Bandyopadhyay and Paul (2010) ...watermarks, and requires little computation to insert or detect, Vanwasi (2001); Shoemaker and Rudko ...invisible image ... See full document

7

Substitution-diffusion based Image Cipher

Substitution-diffusion based Image Cipher

... based image encryption scheme using a key of 128-bit ...the algorithm, image is partitioned into several key based dynamic blocks and each block is passed through the eight rounds of ... See full document

12

A Novel Digital Watermarking Technique for Video Copyright Protection

A Novel Digital Watermarking Technique for Video Copyright Protection

... visible and invisible watermarks into ...copied and manipulated from the internet, but if someone takes a copy of that video using a camera then he will be able to claim it as his own ...system and ... See full document

9

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

... based watermarking scheme is proposed which makes use of both blind and non-blind ...the algorithm is that besides protecting the copyright of the host image it also protects the watermark ... See full document

13

Novel Mechanism Control Algorithm for Wired Network

Novel Mechanism Control Algorithm for Wired Network

... new Novel encryption mechanism to protect the data transfer from client to server and vice ...arrival and service time, expected waiting time and expected busy ... See full document

6

Combined DWT-DCT Digital Image Watermarking

Combined DWT-DCT Digital Image Watermarking

... host image where a watermark can be embedded ...the image energy is concentrated at the lower frequency sub-bands LLx and therefore embedding watermarks in these sub-bands may degrade the ... See full document

7

Show all 10000 documents...