[PDF][PDF] Improving encryption digital watermark by using blue monkey algorithm

OY Abdulhammed - Int J Comput, 2021 - pdfs.semanticscholar.org
Watermarking enables the users to share the digital contents in public domain without any
issue. In the present day, the tremendous development in the digital technologies and …

A framework for deep neural network multiuser authorization based on channel pruning

L Wang, Y Song, Y Zhu, D **a… - … and Computation: Practice …, 2023 - Wiley Online Library
Various deep neural network (DNN) model watermarks have been proposed by researchers
to verify copyrights for deep neural networks DNN. However, most DNN watermarking …

Digital watermarking image using three-level discrete wavelet transform under attacking noise

L Lidyawati, AR Darlis, L Jambola… - Bulletin of Electrical …, 2022 - eprints.itenas.ac.id
The authentication, identification, and copyright protection can be obtained by constructing
the digital image watermarking technique. Watermark robustness and imperceptibility …

Analysis On Digital Image Watermarking Using Dct-Dwt Techniques

Z Kasiran, ZZ Rabi'atul Adawiyah Tarmizi… - Journal of Positive …, 2022 - journalppw.com
In recent years, digital images are used in various platforms by all means of purpose by
people and also creators. The data also can be easily copied or altered, and anyone with a …

Robust watermarking based on dual-random phase encryption against collusion attacks

L Zhu, B Xu - Proceedings of the 8th International Conference on …, 2023 - dl.acm.org
Digital watermarking was an important method for video copyright protection, but it may face
inter-frame linear attack in two kinds of collusion scenarios. By analyze attack principle and …

Adaptive Motion Compensation and Quantized Embedded Watermarking Against Collusion Attacks

H Niu, L Zhu - Proceedings of the 8th International Conference on …, 2023 - dl.acm.org
Digital watermarking was an important method for video copyright protection, but it may face
inter-frame linear attack in two kinds of collusion scenarios. By constructing collusion model …

Research on the Application of Digital Watermarking Algorithm Based on 3D Triangular Mesh Model

X Yu - 2024 International Conference on Electrical Drives …, 2024 - ieeexplore.ieee.org
Digital watermarking uses the redundant information of protected data to embed some
practical information or serial numbers into carrier data through a series of algorithms. These …

[PDF][PDF] Digital Image Protection by Password

SAS Aloud, MSAHM Mansour, M Benhamid - stcrs.com.ly
The case of protecting literate property rights in digital images and digital data is very
important because it protects the rights of individuals and institutions, especially data …

[PDF][PDF] New Approaches to Advanced Network and Image Processing

JH Park - Journal of Information Processing Systems, 2017 - koreascience.kr
The Journal of Information Processing Systems (JIPS) publishes a broad array of subjects
related to information communication technology across prevalent and advanced fields …