|
|
|
Yingying Wang, Chengsong Yang, Changqing Zhu and Kaimeng Ding
Vector geographic data play an important role in location information services. Digital watermarking has been widely used in protecting vector geographic data from being easily duplicated by digital forensics. Because the production and application of ve...
ver más
|
|
|
|
|
|
|
Ugo Fiore and Francesco Rossi
Digital watermarking aims at protecting multimedia content by hiding into it some data that can be used for such purposes as, for example, intellectual property protection or integrity control. Sometimes, the owner of an image would prefer to not transmi...
ver más
|
|
|
|
|
|
|
Ugo Fiore and Francesco Rossi
|
|
|
|
|
|
|
Luz Fátima Huallpa Vargas,Luis Pánfilo Yapu Quispe
En este trabajo se presenta el desarrollo de un procedimiento de autenticación de imágenes digitales combinando diversos métodos relacionados con watermarks (marcas de agua) digitales y métodos de cifrado, con el fin de proteger los derechos de autor de ...
ver más
|
|
|
|
|
|
|
Jitendra Saturwar,D.N. Chaudhari
Pág. 93 - 100
With the growth in digital world, it is becoming more important to find a method toprotect the security of digital media. An image watermarking model based on visual secretsharing (VSS) is proposed for protection of ownership. In the embedding phase, the...
ver más
|
|
|
|
|
|
|
Yunpeng Zhang, Chengyou Wang, Xiaoli Wang and Min Wang
Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarking a...
ver más
|
|
|
|
|
|
|
Yunpeng Zhang, Chengyou Wang, Xiaoli Wang and Min Wang
Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarking a...
ver más
|
|
|
|
|
|
|
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di...
ver más
|
|
|
|
|
|
|
Zhengmao Ye, Hang Yin and Yongmao Ye
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c...
ver más
|
|
|
|
|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus...
ver más
|
|
|
|
|
|
|
Heng Zhang, Chengyou Wang and Xiao Zhou
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob...
ver más
|
|
|
|
|
|
|
Heng Zhang, Chengyou Wang and Xiao Zhou
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Qifei Zhou, Changqing Zhu and Na Ren
How to keep the fidelity of the digital elevation model (DEM) data is a crucial problem in the current watermarking research, as the watermarked DEM data need to preserve their accuracy. We proposed a zero watermarking method for the triangulated irregul...
ver más
|
|
|
|
|
|
|
Qifei Zhou, Na Ren, Changqing Zhu and A-Xing Zhu
Projection transformation is an important part of geographic analysis in geographic information systems, which are particularly common for vector geographic data. However, achieving resistance to projection transformation attacks on watermarking for vect...
ver más
|
|
|
|
|
|
|
J. L. Divya Shivani and Ranjan K. Senapati
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio...
ver más
|
|
|
|
|
|
|
J. L. Divya Shivani and Ranjan K. Senapati
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in hierarchical trees (SPIHT) digital watermarking technique that is robust against several common attacks such as cropping, filtering, sharpening, noise, inversio...
ver más
|
|
|
|
|
|
|
Qianwen Zhou, Changqing Zhu and Na Ren
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on ...
ver más
|
|
|
|
|
|
|
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw...
ver más
|
|
|
|