52   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Jose Juan Garcia-Hernandez, Claudia Feregrino-Uribe, Alejandra Menendez-Ortiz and Dan Williams Robledo-Cruz    
In the literature, robust reversible watermarking schemes (RWSs) allow the extraction of watermarks after the images have suffered attacks; however, the modified images are compromised. On the other hand, self-recovery schemes will restore the compromise... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qifei Zhou, Changqing Zhu and Na Ren    
How to keep the fidelity of the digital elevation model (DEM) data is a crucial problem in the current watermarking research, as the watermarked DEM data need to preserve their accuracy. We proposed a zero watermarking method for the triangulated irregul... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Heng Zhang, Chengyou Wang and Xiao Zhou    
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Heng Zhang, Chengyou Wang and Xiao Zhou    
With the development of image processing technology, the copyright protection of digital images has become an urgent problem to be solved. As an effective method, the robust digital watermarking technique emerges at a historic moment. Currently, most rob... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zhengmao Ye, Hang Yin and Yongmao Ye    
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermarking scheme is proposed by applying the chaotic logistic system and hyper-c... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
El-Sayed M. El-Kenawy, Nima Khodadadi, Ashin Khoshnaw, Seyedali Mirjalili, Amel Ali Alhussan, Doaa Sami Khafaga, Abdelhameed Ibrahim and Abdelaziz A. Abdelhamid    
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital watermarking is usually employed. This work proposes a new approach to di... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Franco Frattolillo    
Watermarking protocols, in conjunction with digital watermarking technologies, make it possible to trace back digital copyright infringers by identifying who has legitimately purchased digital content and then illegally shared it on the Internet. Althoug... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mahbuba Begum and Mohammad Shorif Uddin    
Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Base... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yunpeng Zhang, Chengyou Wang, Xiaoli Wang and Min Wang    
Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarking a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Yunpeng Zhang, Chengyou Wang, Xiaoli Wang and Min Wang    
Watermarking techniques can be applied in digital images to maintain the authenticity and integrity for copyright protection. In this paper, scale-invariant feature transform (SIFT) is combined with local digital watermarking and a digital watermarking a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hwai-Tsu Hu, Ying-Hsiang Lu     Pág. 18 - 32
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Hwai-Tsu Hu, Ying-Hsiang Lu    
This paper presents a lifting wavelet transform (LWT)-based blind audio watermarking scheme designed for tampering detection and self-recovery. Following 3-level LWT decomposition of a host audio, the coefficients in selected subbands are first partition... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Can Li, Hua Sun, Changhong Wang, Sheng Chen, Xi Liu, Yi Zhang, Na Ren and Deyu Tong    
In order to safeguard image copyrights, zero-watermarking technology extracts robust features and generates watermarks without altering the original image. Traditional zero-watermarking methods rely on handcrafted feature descriptors to enhance their per... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman    
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Bimo Sunarfri Hantono, Syukron Abu Ishaq Alfarozi, Azkario Rizky Pratama, Ahmad Ataka Awwalur Rizqi, I Wayan Mustika, Mardhani Riasetiawan and Anna Maria Sri Asih    
Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically focus... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Manjur Kolhar and Sultan Mesfer Aldossary    
Deep learning (DL) algorithms can improve healthcare applications. DL has improved medical imaging diagnosis, therapy, and illness management. The use of deep learning algorithms on sensitive medical images presents privacy and data security problems. Im... ver más
Revista: AI    Formato: Electrónico

 
en línea
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro    
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qianwen Zhou, Changqing Zhu and Na Ren    
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Marco Botta, Davide Cavagnino and Alessandro Druetto    
Base45 encodes pairs of octets using 3 characters from an alphabet of 45 printable symbols. Previous works showed the ability to hide payload data into encoded strings by exploiting the unused configurations of the Base45 encoding. In this paper, we pres... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »