Zobrazeno 1 - 10
of 801
pro vyhledávání: '"imperceptibility"'
Publikováno v:
Computer Science Journal of Moldova, Vol 32, Iss 2(95), Pp 242-261 (2024)
In recent years, image watermarking has become the most active research in the information hiding field. This paper presents an application of a computational intelligence technique to obtain robust and secure image-watermarking schemes for data imag
Externí odkaz:
https://doaj.org/article/66efb49552c6462a8d9f87817baf7fad
Publikováno v:
Journal of Applied Sciences and Environmental Management, Vol 28, Iss 10 (2024)
Ensuring data security is an essential priority to be put forward once there will be a digital transmission between any two or more targeted audience. Hence, the objective of this paper was to propose a better data security model for a protective inf
Externí odkaz:
https://doaj.org/article/d6e8a84720cd4cac920b7557719a58f9
Autor:
G. Julie Sharine, L. Jani Anbarasi
Publikováno v:
IEEE Access, Vol 12, Pp 158966-158983 (2024)
The rapid advancement of technology and increased internet usage have significantly contributed to the development of multimedia technologies, such as computer games and computer graphics. A key aspect of these advancements is the creation and widesp
Externí odkaz:
https://doaj.org/article/1f4a81bec0b24bdc914f671fbefab8a3
Publikováno v:
IEEE Access, Vol 12, Pp 143434-143457 (2024)
Steganography, an intricate technique that discreetly conceals information within innocuous carrier files, has become indispensable for safeguarding confidential communication. Hence, a comprehensive exploration of its multifaceted aspects and consti
Externí odkaz:
https://doaj.org/article/1337eed0c4b34f6d97a1e2f54a3813a1
Publikováno v:
IEEE Access, Vol 12, Pp 35231-35245 (2024)
Imperceptibility and robustness are a part of trade-off components in image watermarking schemes and become one of the most studied in this field. Increasing imperceptibility usually will reduce the robustness, conversely, increasing the robustness m
Externí odkaz:
https://doaj.org/article/8834d2053a2a42aabe888c77a3165b07
Publikováno v:
Visual Computing for Industry, Biomedicine, and Art, Vol 6, Iss 1, Pp 1-11 (2023)
Abstract Deep neural networks are vulnerable to attacks from adversarial inputs. Corresponding attack research on human pose estimation (HPE), particularly for body joint detection, has been largely unexplored. Transferring classification-based attac
Externí odkaz:
https://doaj.org/article/81f4f10b1c8c476da8539bba0a7dfb6a
Autor:
Abhijit J. Patil, Ramesh Shelke
Publikováno v:
High-Confidence Computing, Vol 3, Iss 4, Pp 100153- (2023)
Watermarking is the advanced technology utilized to secure digital data by integrating ownership or copyright protection. Most of the traditional extracting processes in audio watermarking have some restrictions due to low reliability to various atta
Externí odkaz:
https://doaj.org/article/b6eaa6951a7c4374b5b83783ff64983a
Publikováno v:
Cybernetics and Information Technologies, Vol 23, Iss 1, Pp 110-124 (2023)
Embedding the watermark is still a challenge in image watermarking. The watermark should not reduce the visual quality of the image being watermarked and hard to distinguish from its original. Embedding a watermark of a small size might be a good sol
Externí odkaz:
https://doaj.org/article/4de6831458eb40048af409d3892aa054
Autor:
Xuping Huang, Akinori Ito
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2757 (2024)
This paper aims to explore an alternative reversible digital watermarking solution to guarantee the integrity of and detect tampering with data of probative importance. Since the payload for verification is embedded in the contents, algorithms for re
Externí odkaz:
https://doaj.org/article/0601dcad9d20449dacc3a8a13027053f
Publikováno v:
Applied Sciences, Vol 14, Iss 4, p 1494 (2024)
With the extensive adoption of generative models across various domains, the protection of copyright for these models has become increasingly vital. Some researchers suggest embedding watermarks in the images generated by these models as a means of p
Externí odkaz:
https://doaj.org/article/9cf4029bb5e34ac68531870114105701