Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Review on optical image hiding and watermarking techniques
Abstract Information security is a critical issue in modern society and image watermarking
can effectively prevent unauthorized information access. Optical image watermarking …
can effectively prevent unauthorized information access. Optical image watermarking …
A logistic map based blind and fragile watermarking for tamper detection and localization in images
AK Sahu - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
In real-time data transmission, the protection of multimedia content from unauthorized
access is pivotal. In this context, digital watermarking techniques have drawn significant …
access is pivotal. In this context, digital watermarking techniques have drawn significant …
DCT based efficient fragile watermarking scheme for image authentication and restoration
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …
restoration are very essential, especially when it is utilized in forensic science, medical …
Multiplicative watermark decoder in contourlet domain using the normal inverse Gaussian distribution
In recent years, many works on digital image watermarking have been proposed all aiming
at protection of the copyright of an image document or authentication of data. This paper …
at protection of the copyright of an image document or authentication of data. This paper …
Secured steganographic scheme for highly compressed color image using weighted matrix through DCT
Due to the rapid growth of internet technology and the advent of various image processing
tools, people started using digital media for hidden communication to protect valuable …
tools, people started using digital media for hidden communication to protect valuable …
A robust multiplicative watermarking technique for digital images in curvelet domain using normal inverse Gaussian distribution
The illegal duplication of digital copies became easier because of increased communication
speed and rapid growth of internetworked multimedia systems. So it is required to …
speed and rapid growth of internetworked multimedia systems. So it is required to …
Halftone image watermarking by content aware double-sided embedding error diffusion
In this paper, we carry out a performance analysis from a probabilistic perspective to
introduce the error diffusion-based halftone visual watermarking (EDHVW) methods' …
introduce the error diffusion-based halftone visual watermarking (EDHVW) methods' …
Binomial transform based fragile watermarking for image authentication
In this paper, a novel Binomial transform based fragile watermarking technique has been
proposed for color image authentication. Binomial transform (BT) is applied to convert each …
proposed for color image authentication. Binomial transform (BT) is applied to convert each …
[HTML][HTML] Ownership protection of plenoptic images by robust and reversible watermarking
Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to
the images captured by conventional cameras, plenoptic images carry a considerable …
the images captured by conventional cameras, plenoptic images carry a considerable …
A robust 3D point cloud watermarking method based on the graph Fourier transform
Many modern applications make use of 3D modeling and/or reconstruction of complex
objects, such as historical monuments and entire urban centers. One of the most common …
objects, such as historical monuments and entire urban centers. One of the most common …