当前位置:
首页 资源下载
搜索资源 - secure watermarking
搜索资源列表
-
0下载:
hybrid wavelet - SVD based video watermarking in secure domain-hybrid wavelet- SVD based video watermarking in secure domain
-
-
0下载:
Cryptanalysis of Hwang-Changs a Time-Stamp Protocol for Digital Watermarking-In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit
watermarking. They claimed that their scheme is secure against attacks. However, in this
article,
-
-
0下载:
To secure an image -watermarking-To secure an image-watermarking
-
-
0下载:
Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technol
-
-
0下载:
Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technol
-
-
0下载:
Owing to the broad application value of audio
watermarking in remote transmission and mobile
extraction, it is very important to study watermarking
approaches against A/D and D/A conversion. Based
on wavelet decomposition and cepstrum technol
-
-
0下载:
As rapid growth of multimedia technology, secure video communication is also an important issue so video watermarking algorithm has been summerized over here.
-
-
0下载:
this a method of watermarking.
where SVD and DCT both are used to get robust and secure watermarking
-this is a method of watermarking.
where SVD and DCT both are used to get robust and secure watermarking
-
-
0下载:
This a methodology of robust and secure watermarking scheme as described in the following paper http://www.ias.ac.in/sadhana/Pdf2012Aug/425.pdf. Besides that the code implements ROC curves and different methods of attacks to justify the robustness of
-
-
0下载:
Secure watermarking for multimedia
-
-
0下载:
数字水印方法的安全性是基于假定嵌入和检测的算法是秘密的。它们是不方便公众审查和广泛使用。因此,需要一种可以打开的、同时安全的水印算法。类似于密码分析的十二种模型用来对数字水印的安全性进行评价。它们
用于评估拼凑水印算法和它们的弱点。-The security of digital watermarking methods is based on
the assumption that their embedding and detection algorithms are kept
-
-
0下载:
基于[Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, Secure Spread
Spectrum Watermarking for Multimedia, IEEE Trans. on Image Processing, Dec. 1997]文章实现得水印程序。-Based on [Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal S
-
-
0下载:
Robust Watermarking Algorithms for Content Authentication and Secure Image Transmission through Single Carrier Frequency Division Multiple Acce-Robust Watermarking Algorithms for Content Authentication and Secure Image Transmission through Single Car
-
-
0下载:
Digital image watermarking using DCT-DWT and arnold transform.
-