Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Steganography in discrete wavelet transform based on human visual system and cover model
In this paper we present a model-based image steganography method in discrete wavelet
transform (DWT). This method is based on the human visual system model. The proposed …
transform (DWT). This method is based on the human visual system model. The proposed …
[PDF][PDF] A Dual Digital-Image Watermarking Technique.
M Sharkas, D ElShafie, N Hamdy - WEC (5), 2005 - Citeseer
Image watermarking has become an important tool for intellectual property protection and
authentication. In this paper a watermarking technique is suggested that incorporates two …
authentication. In this paper a watermarking technique is suggested that incorporates two …
Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking
M Arora, M Khurana - Optical and Quantum Electronics, 2020 - Springer
In this paper, an enhanced symmetric hybrid digital cryptosystem method based on jigsaw
transform, digital domain watermarking using discrete cosine domain is proposed. To further …
transform, digital domain watermarking using discrete cosine domain is proposed. To further …
A new technique of frequency domain watermarking based on a local ring
This paper presents a new and comparatively secure watermarking technique, in the
frequency domain. Our scheme deploys a local ring-based substitution box (S-box). The …
frequency domain. Our scheme deploys a local ring-based substitution box (S-box). The …
Adaptive multiwavelet-based watermarking through JPW masking
L Cui, W Li - IEEE Transactions on Image Processing, 2010 - ieeexplore.ieee.org
In this paper, a multibit, multiplicative, spread spectrum watermarking using the discrete
multiwavelet (including unbalanced and balanced multiwavelet) transform is presented …
multiwavelet (including unbalanced and balanced multiwavelet) transform is presented …
Reversible dynamic secure steganography for medical image using graph coloring
Securing data in telemedicine applications is extremely essential and therefore it is
mandatory to develop algorithms which preserve the data transmitted. Steganography …
mandatory to develop algorithms which preserve the data transmitted. Steganography …
A robust associative watermarking technique based on vector quantization
JJ Shen, JM Ren - Digital Signal Processing, 2010 - Elsevier
In this paper, the concepts of vector quantization (VQ) and association rules in data mining
are employed to propose a robust watermarking technique. Unlike ordinary or traditional …
are employed to propose a robust watermarking technique. Unlike ordinary or traditional …
[PDF][PDF] Human face detection system using HSV
I Aldasouqi, M Hassan - Recent Researches in Circuits, Systems …, 2010 - researchgate.net
We are reporting the results of an enhanced performance human face detection using HSV
color model without sacrificing the speed of detection. The proposed algorithm has been …
color model without sacrificing the speed of detection. The proposed algorithm has been …
DWT based watermarking algorithm of color images
G Sun, Y Yu - 2007 2nd IEEE Conference on Industrial …, 2007 - ieeexplore.ieee.org
The digital products are copied and transmitted widely with the development of Internet
rapidly. The copyright protected, the authenticity and the integrality authenticated are …
rapidly. The copyright protected, the authenticity and the integrality authenticated are …
CEW: A non-blind adaptive image watermarking approach based on entropy in contourlet domain
S Zaboli, MS Moin - 2007 IEEE International Symposium on …, 2007 - ieeexplore.ieee.org
This paper presents a new approach for non-blind watermarking of still gray level images in
contourlet domain. It uses the human visual system (HVS) characteristic, and an innovative …
contourlet domain. It uses the human visual system (HVS) characteristic, and an innovative …