• Nenhum resultado encontrado

[PDF] Top 20 A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

Has 10000 "A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection" found on our website. Below are the top 20 most common "A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection".

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection

... a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the ... See full document

13

Non Correlation DWT Based Watermarking Behavior in Different Color Spaces

Non Correlation DWT Based Watermarking Behavior in Different Color Spaces

... computers and the internet are major communication media that bring the different parts of the world into one global virtual ...information and distance is no longer a barrier to ...safety and ... See full document

9

A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value

A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value

... for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a ... See full document

6

DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

DIGITAL WATERMARKING SCHEMES FOR AUTHORIZATION AGAINST COPYING OR PIRACY OF COLOR IMAGES

... digital watermarking methods for authorization against copying or piracy of color ...images. Watermarking is a very important field for copyrights of various electronic documents and ...Digital ... See full document

6

A Novel Algorithm for Watermarking and Image Encryption

A Novel Algorithm for Watermarking and Image Encryption

... Digital watermarking is a method of copyright protection of audio, images, video and ...robust watermarking technique based on contourlet transform and singular value ... See full document

10

An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection

An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection

... Digital Watermarking defines methods and technologies that hide information, for example a number or text, in digital media, such as images, copyright protection, tamper proofing, video or audio ... See full document

18

Efficient Watermarking Technique for Digital Media (Images and Videos)

Efficient Watermarking Technique for Digital Media (Images and Videos)

... of Watermarking is Watermark Embedding by applying DWT Technique and Watermark ...watermarked image should not lose much of a quality after the addition of ...of ... See full document

7

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUAL CRYPTOGRAPHY

DWT-SVD BASED SECURED IMAGE WATERMARKING FOR COPYRIGHT PROTECTION USING VISUAL CRYPTOGRAPHY

... robust watermarking technique for copyright protection has been ...the technique utilizes the properties of both DWT and SVD the proposed technique is more robust against ... See full document

8

Enhanced Image Registration Technique for Medical Image Segmentation

Enhanced Image Registration Technique for Medical Image Segmentation

... imaging, and satellite ...filtering and then undergo with a block ridge let transform [3] on each band pass data, later it is directly used in frequency partitioning without using ridge let transform ... See full document

7

PLASMA STRUCTURE EXTRACTION FROM LASCO IMAGES BY THE DUAL-TREE COMPLEX WAVELET TRANSFORM

PLASMA STRUCTURE EXTRACTION FROM LASCO IMAGES BY THE DUAL-TREE COMPLEX WAVELET TRANSFORM

... faint and few things can be said concerning its internal ...images and some square-like features inside those ...characterization and further ...this image, our result shows that the contours ... See full document

12

Separable Watermarking Technique Using the Biological Color Model

Separable Watermarking Technique Using the Biological Color Model

... robust and fragile watermarking is still main focus for various researchers ...a watermarking technique depends on how complex as well as how feasible to ...geometry and transformation. ... See full document

10

Image Fusion Based On Wavelet Transform

Image Fusion Based On Wavelet Transform

... The DWT is shift variant because of the decimation operation exploited in the transform ...property and improves directional resolution when compared with that of the ..., and ±75 0 while the ... See full document

4

Block Based Video Watermarking Scheme Using Wavelet Transform and Principle Component Analysis

Block Based Video Watermarking Scheme Using Wavelet Transform and Principle Component Analysis

... video watermarking [4-7]. Video watermarking schemes can be classified into two main categories based on the domain which used for hiding the watermark bits in the host ...domain ... See full document

6

A Novel Content-Based Image Retrieval Technique Using Tree Matching

A Novel Content-Based Image Retrieval Technique Using Tree Matching

... computer and communication technologies have led to enormous archives of digital images in various areas such as digital library, medicine, art galleries, remote sensing, education, entertainment and so ... See full document

5

An Evaluation of Static Java Bytecode Watermarking

An Evaluation of Static Java Bytecode Watermarking

... static watermark algo- rithms are resilient to semantics preserving transforma- ...watermarks and 1 ‘Add Method and Field’ watermark from the test ...cations and we assume that the ... See full document

8

Uniform and Non-Uniform Single Image Deblurring Based on Sparse Representation and Adaptive Dictionary Learning

Uniform and Non-Uniform Single Image Deblurring Based on Sparse Representation and Adaptive Dictionary Learning

... (probabilistic) and regularization. The class of Bayesian framework based algorithms use some probabilistic priors either on latent image or on blur kernels or images’ edge distribution, to derive ... See full document

14

A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform

... fragile watermarking using discrete cosine transform is ...key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and ... See full document

8

An Innovative Skin Detection Approach Using Color Based Image Retrieval Technique

An Innovative Skin Detection Approach Using Color Based Image Retrieval Technique

... As mentioned in the introduction, one of the advantages of the given approach in this paper is its ability to detect different kinds of skin. In order that this approach distinguish different kinds of skin such as ... See full document

9

A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform

A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform

... Digital watermarking is a technique which allows an individual to add copyright notices or other verification messages to digital ...media. Image authentication is one of the applications of digital ... See full document

7

A Robust Method for Image Watermarking Using Block Differencing LSB Substitution

A Robust Method for Image Watermarking Using Block Differencing LSB Substitution

... transmission and manipulation of ...use and protection against illegal use of ...privacy and security of the ...steganography and digital watermarking. Digital ... See full document

4

Show all 10000 documents...