-
1
Provable secure digital watermarking scheme
Published 2008-01-01“…A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.…”
Get full text
Article -
2
Improving Robustness of Biometric Identity Determination with Digital Watermarking
Published 2016-01-01“…The determination of identities with such precision from face images taken under a wide range of natural situations is still an unsolved problem. We propose a digital watermarking based method to aid face recognizers to tackle this problem in applications. …”
Get full text
Article -
3
Improving authenticity and provenance in digital biomarkers: the case for digital watermarking
Published 2025-01-01“…This article examines the potential of digital watermarking to help safeguard the reliability and provenance of DBx data, whilst also addressing broader challenges in health systems.…”
Get full text
Article -
4
Adaptive digital watermarking algorithm under image quad-tree partition
Published 2017-12-01“…An adaptive digital watermarking algorithm based on image quad-tree partition was proposed.The original image was approximated by various least square polynomial patches at multiple scales and was organized by a quad-tree structure.At the same time,this representation also reflected the texture information of image.By calculating the watermark embedding intensity in different regions,an adaptive digital watermarking scheme based on the number of the refined meshes in each region was realized.The experiment results show that this algorithm has the good imperceptibility and robustness.…”
Get full text
Article -
5
Digital watermarking algorithm in SWT domain based on robust local feature
Published 2019-11-01Get full text
Article -
6
Self-embedding robust digital watermarking algorithm with perfectly blind detection
Published 2012-10-01Subjects: “…digital watermarking…”
Get full text
Article -
7
Reversible digital watermarking-based protocol for data integrity in wireless sensor network
Published 2018-03-01Subjects: “…reversible digital watermarking…”
Get full text
Article -
8
Robust digital watermark method based on PDF417 two-dimension code
Published 2016-09-01Subjects: Get full text
Article -
9
Digital watermarking method based on context word prediction and window compression coding
Published 2024-02-01Subjects: “…digital watermarking…”
Get full text
Article -
10
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01“…Experimental results show that the algorithm has good image vision fidelity. The proposed digital watermarking is playing a more important role in network security for electric power system.…”
Get full text
Article -
11
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Local histogram shifting digital watermark algorithm is used to protect the data integrity which has high payload and makes the original image restored losslessly if the data is verified to be integrated. …”
Get full text
Article -
12
Application of Tchebichef moment in image watermarking techniques
Published 2003-01-01Subjects: “…digital watermarking…”
Get full text
Article -
13
Authentication-based double images fractal watermarking model of vector maps
Published 2009-01-01Subjects: Get full text
Article -
14
Novel blind audio watermarking algorithm in the hybrid domain
Published 2007-01-01Subjects: “…digital watermarking…”
Get full text
Article -
15
Study on authority watermark of the electronic chart based on the semantics characteristics
Published 2016-11-01Subjects: Get full text
Article -
16
Research of composite safety protection for digital maps
Published 2016-02-01Subjects: Get full text
Article -
17
Image visualization encryption algorithm based on Shamir threshold secret key sharing
Published 2018-07-01Subjects: Get full text
Article -
18
Research on color QR code watermarking technology based on chaos theory
Published 2018-07-01Subjects: Get full text
Article -
19
Document watermarking scheme for information tracking
Published 2008-01-01Subjects: Get full text
Article -
20
Access Control for Autborized Video in Information-Centric Networking
Published 2014-09-01Subjects: Get full text
Article