Academic literature on the topic 'Computer networks Digital watermarking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Digital watermarking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks Digital watermarking"

1

Lee, Jae-Eun, Ji-Won Kang, Woo-Suk Kim, Jin-Kyum Kim, Young-Ho Seo, and Dong-Wook Kim. "Digital Image Watermarking Processor Based on Deep Learning." Electronics 10, no. 10 (2021): 1183. http://dx.doi.org/10.3390/electronics10101183.

Full text
Abstract:
Much research and development have been made to implement deep neural networks for various purposes with hardware. We implement the deep learning algorithm with a dedicated processor. Watermarking technology for ultra-high resolution digital images and videos needs to be implemented in hardware for real-time or high-speed operation. We propose an optimization methodology to implement a deep learning-based watermarking algorithm in hardware. The proposed optimization methodology includes algorithm and memory optimization. Next, we analyze a fixed-point number system suitable for implementing ne
APA, Harvard, Vancouver, ISO, and other styles
2

Umamageswari, A., and G. R. Suresh. "Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (2015): 544. http://dx.doi.org/10.11591/tijee.v15i3.1573.

Full text
Abstract:
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which provides confidentiality, integrity and authentication by embedding Digital Signature (DS) with the Medical image. In this paper we focus on need for reversible watermarking, Medical Image Compression and security related problems in medical images, it comparing the performances of various lossless watermarking techniques for various medical
APA, Harvard, Vancouver, ISO, and other styles
3

Yin, Hao. "A Survey of Digital Watermarking." Journal of Computer Research and Development 42, no. 7 (2005): 1093. http://dx.doi.org/10.1360/crad20050701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, Hong Yu, Jian Ping Wang, and Yan Pei Liu. "The Development Research of Digital Watermarking Technology." Advanced Materials Research 271-273 (July 2011): 1041–44. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.1041.

Full text
Abstract:
With the development of computer network and information, digital product is more and more popular. So the problem of protecting the digital product's copyright is urgent and important. Digital watermarking contains the copyright information and authentication information, and protects legal copy and distribution of digital products, which has been the hotspot of international academia. The paper analyze digital watermarking technology, and discuss its various algorithm, point out their characteristic and disadvantages. A good digital watermarking algorithm need to implement blind extraction,
APA, Harvard, Vancouver, ISO, and other styles
5

A. A. Sirota, M. A. Dryuchenko, and E. Yu Mitrofanova. "Digital Watermarking Based on Neural Network Technologies." Journal of Convergence Information Technology 8, no. 11 (2013): 616–24. http://dx.doi.org/10.4156/jcit.vol8.issue11.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barnett, R. "Digital watermarking: applications, techniques and challenges." Electronics & Communication Engineering Journal 11, no. 4 (1999): 173–83. http://dx.doi.org/10.1049/ecej:19990401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Santoyo-Garcia, Hector, Eduardo Fragoso-Navarro, Rogelio Reyes-Reyes, Clara Cruz-Ramos, and Mariko Nakano-Miyatake. "Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras." Security and Communication Networks 2017 (2017): 1–18. http://dx.doi.org/10.1155/2017/7903198.

Full text
Abstract:
In this paper we propose a visible watermarking algorithm, in which a visible watermark is embedded into the Bayer Colour Filter Array (CFA) domain. The Bayer CFA is the most common raw image representation for images captured by single sensor digital cameras equipped in almost all mobile devices. In proposed scheme, the captured image is watermarked before it is compressed and stored in the storage system. Then this method enforces the rightful ownership of the watermarked image, since there is no other version of the image rather than the watermarked one. We also take into consideration the
APA, Harvard, Vancouver, ISO, and other styles
8

Li Zhaofeng. "Research on Improved Digital Image Encryption Watermarking Algorithm." International Journal of Digital Content Technology and its Applications 7, no. 4 (2013): 43–49. http://dx.doi.org/10.4156/jdcta.vol7.issue4.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Anees, Amir, Iqtadar Hussain, Abdulmohsen Algarni, and Muhammad Aslam. "A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map." Security and Communication Networks 2018 (June 28, 2018): 1–20. http://dx.doi.org/10.1155/2018/1840207.

Full text
Abstract:
The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this paper, first, we present a unified framework for embedding and detecting watermark in digital data. Second, a new robust watermarking scheme is proposed considering this concern. The proposed work incorporates three chaotic maps which specify the location for embedding the watermark. Third, a new chaotic map, the Extended Logistic map, is proposed in this work. The proposed map has a bigger range than logistic and cubic maps. It has shown good results in a bifurcation, sensitivity to initial co
APA, Harvard, Vancouver, ISO, and other styles
10

Sirota, A. A., M. A. Dryuchenko, and E. Yu Mitrofanova. "Digital watermarking method based on heteroassociative image compression and its realization with artificial neural networks." Computer Optics 42, no. 3 (2018): 483–94. http://dx.doi.org/10.18287/2412-6179-2018-42-3-483-494.

Full text
Abstract:
In this paper, we present a digital watermarking method and associated algorithms that use a heteroassociative compressive transformation to embed a digital watermark bit sequence into blocks (fragments) of container images. A principal feature of the proposed method is the use of the heteroassociative compressing transformation – a mutual mapping with the compression of two neighboring image regions of an arbitrary shape. We also present the results of our experiments, namely the dependencies of quality indicators of thus created digital watermarks, which show the container distortion level,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks Digital watermarking"

1

Tu, Ronghui. "Semi-fragile digital audio watermarking." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26432.

Full text
Abstract:
The digital information has brought many changes to our life in recent decades. With the rapid growth of digital information, a lot of new techniques are coming into being. Digital watermarking is one of them. This thesis presents a semi-fragile audio watermarking scheme which can be applied to content authentication or copyright verification. The major contribution of this thesis is the introduction and implementation of a unified copyright verification and content authentication algorithm for audio signal. In our approach, we embed the watermark in the discrete wavelet domain of an audio by
APA, Harvard, Vancouver, ISO, and other styles
2

Cai, Libin. "Speech quality evaluation using digital watermarking." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27115.

Full text
Abstract:
Speech quality evaluation is a very important research topic. The Mean Opinion Score (MOS) is reliable but the listening test is very expensive, time consuming, and even impractical for some applications. Objective quality evaluation methods require either the original speech or a complicated computation model, which makes some applications of quality evaluation impossible. Different from the perceptual model used by the Perceptual Evaluation of Speech Quality (PESQ), in this thesis, we propose to use digital audio watermarking to evaluate the quality of speech. Based on quantization, watermar
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Huiping. "Digital image watermarking for ownership verification." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/29018.

Full text
Abstract:
The development of the Internet has greatly contributed to the expanded use of digital media, for example, images, audio, video, VRML objects. These media can be duplicated unlimitedly without any quality loss and can also be easily distributed and tempered. This presents problems of digital media security, such as copyright protection and authentication, which creates a pressing need for digital media protection schemes. A new emerging technology, digital watermarking, protects digital media by embedding a robust signal directly into the media, thus providing a promising way to protect the di
APA, Harvard, Vancouver, ISO, and other styles
4

Yip, Shu Kei. "Digital watermarking and data hiding /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ECED%202006%20YIP.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Richard Yuk Ming. "Digital watermarking and data hiding /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LIR.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abdulaziz, Nidhal Kadhim 1958. "Digital watermarking and data hiding in multimedia." Monash University, Dept. of Electrical and Computer Systems Engineering, 2001. http://arrow.monash.edu.au/hdl/1959.1/8047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Chunlin. "A robust region-adaptive digital image watermarking system." Thesis, Liverpool John Moores University, 2012. http://researchonline.ljmu.ac.uk/6122/.

Full text
Abstract:
Digital image watermarking techniques have drawn the attention of researchers and practitioners as a means of protecting copyright in digital images. The technique involves a subset of information-hiding technologies, which work by embedding information into a host image without perceptually altering the appearance of the host image. Despite progress in digital image watermarking technology, the main objectives of the majority of research in this area remain improvements in the imperceptibility and robustness of the watermark to attacks. Watermark attacks are often deliberately applied to a wa
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Zi Yu. "Digital watermarking methods with robustness and reversibility." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3869193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Gaurav. "Robust digital watermarking of multimedia objects." Phd thesis, Australia : Macquarie University, 2008. http://hdl.handle.net/1959.14/28597.

Full text
Abstract:
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008.<br>Bibliography: p. 144-153.<br>Introduction -- Background -- Overview of watermarking -- Natural language watermarking -- Software watermarking -- Semi-blind and reversible database watermarking -- Blind and reversible database watermarking -- Conclusion and future research -- Bibliography.<br>Digital watermarking has generated significant research and commercial interest in the past decade. The primary factors contributing to this surge are widespread use of the Internet wit
APA, Harvard, Vancouver, ISO, and other styles
10

Balci, Salih Eren. "Robust Watermarking Of Images." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1091917/index.pdf.

Full text
Abstract:
Digital image watermarking has gained a great interest in the last decade among researchers. Having such a great community which provide a continuously growing list of proposed algorithms, it is rapidly finding solutions to its problems. However, still we are far away from being successful. Therefore, more and more people are entering the field to make the watermarking idea useful and reliable for digital world. Of these various watermarking algorithms, some outperform others in terms of basic watermarking requirements like robustness, invisibility, processing cost, etc. In this thesis, we stu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks Digital watermarking"

1

Wayner, Peter. Disappearing cryptography: Information hiding : steganography & watermarking. 2nd ed. Morgan Kaufmann, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Lihe. Tou shi xin xi yin cang. Guo fang gong ye chu ban she, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wayner, Peter. Disappearing cryptography: Being and nothingness on the Net. AP Professional, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2nd 2006 Pasadena, Calif.). 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing: (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA. IEEE Computer Society, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

International, Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th 2008 Harbin Shi China). IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China. IEEE Computer Society, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Matthew, Miller, and Bloom Jeffrey, eds. Digital watermarking. Morgan Kaufmann, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bernd, Girod, ed. Informed watermarking. Kluwer Academic Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shih, Frank Y. Digital watermarking and steganography: Fundamentals and techniques. Taylor & Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Disappearing cryptography information hiding: Steganography and watermarking. 3rd ed. Morgan Kaufmann Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Digital neural networks. PTR Prentice Hall, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks Digital watermarking"

1

Sahu, Satya Prakash, and Satya Verma. "Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography." In Computer Networks and Information Technologies. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19542-6_117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tang, Guoping, and Xiaofeng Liao. "A Neural Network Based Blind Watermarking Scheme for Digital Images." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-28648-6_103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vemuri, Sreya, and Rejo Mathew. "A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Piao, Cheng-Ri, Seunghwa Beack, Dong-Min Woo, and Seung-Soo Han. "A Blind Watermarking Algorithm Based on HVS and RBF Neural Network for Digital Image." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11881070_68.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Petitcolas, Fabien A. P. "Digital Watermarking." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10941270_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pan, Feng, and Jiwu Huang. "Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model." In Digital Watermarking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18405-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Zhenyu, Xiaowei Yi, and Xianfeng Zhao. "Improving Audio Steganalysis Using Deep Residual Networks." In Digital Forensics and Watermarking. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43575-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Usama, Muhammad, and Dong Eui Chang. "Towards Robust Neural Networks with Lipschitz Continuity." In Digital Forensics and Watermarking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11389-6_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hien, Thai D., Yen-Wei Chen, and Zensho Nakao. "PCA Based Digital Watermarking." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45224-9_192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Zhongliang, Nan Wei, Qinghe Liu, Yongfeng Huang, and Yujin Zhang. "GAN-TStega: Text Steganography Based on Generative Adversarial Networks." In Digital Forensics and Watermarking. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43575-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks Digital watermarking"

1

Gong, Xuecheng, and Wanggen Li. "A Color Image Blind Digital Watermarking Algorithm Based on QR Code." In 8th International Conference on Computer Science and Information Technology (CoSIT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110405.

Full text
Abstract:
With the rapid development of network technology and multimedia, the current color image digital watermarking algorithm has the problems of small capacity and poor robustness. In order to improve the capacity and anti-attack ability of digital watermarking. A color image blind digital watermarking algorithm based on QR code is proposed. The algorithm combines Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT). First, the color image was converted from RGB space to YCbCr space, and the Y component was extracted and the second-level discrete wavelet transform is performed; seco
APA, Harvard, Vancouver, ISO, and other styles
2

Padmavathi, G., D. Shanmugapriya, and M. Kalaivani. "Digital watermarking technique in vehicle identification using wireless sensor Networks." In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icacte.2010.5579797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weijun Zhang and Xuetian Meng. "An improved digital watermarking technology based on QR code." In 2015 4th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2015. http://dx.doi.org/10.1109/iccsnt.2015.7490906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sun, Jin-guang, and Ying-jie Xiao. "Digital Watermarking Algorithm Based on Template and Local Feature." In 2009 International Symposium on Computer Network and Multimedia Technology (CNMT 2009). IEEE, 2009. http://dx.doi.org/10.1109/cnmt.2009.5374511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yi, Yeqing, Rui Li, Fei Chen, Alex X. Liu, and Yaping Lin. "A digital watermarking approach to secure and precise range query processing in sensor networks." In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6566995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ghosh, Sudip, Subhojit Chatterjee, Santi P. Maity, and Hafizur Rahaman. "A new algorithm on wavelet based robust invisible digital image watermarking for multimedia security." In 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV). IEEE, 2015. http://dx.doi.org/10.1109/edcav.2015.7060542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guohuan, Lou, Lei Ming, and Zhao Wei. "A Simple Digital Watermarking System Based on BP Neural Network." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Panchal, Hitesh, Kunal Acharya, Pradip Panchal, and Naimish Thakar. "Digital watermarking on extracted key frames from uncompressed color video using 4-level DWT." In 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC 2011). IEEE, 2011. http://dx.doi.org/10.1109/etncc.2011.6255915.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Qin, Xiaoqing Feng, and Surong Yan. "A digital watermarking algorithm against affine transformation for 3D mesh model." In 2016 5th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2016. http://dx.doi.org/10.1109/iccsnt.2016.8070264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kulkarni, Gururaj, and Suresh Kuri. "Robust digital image watermarking using DWT, DCT and probabilistic neural network." In 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT). IEEE, 2017. http://dx.doi.org/10.1109/iceeccot.2017.8284571.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer networks Digital watermarking"

1

Emelyanov, I. I., and N. N. Ziyatdinov. Interface of computer-aided design of heat exchange networks based on digital models «HEN-Design». OFERNIO, 2020. http://dx.doi.org/10.12731/ofernio.2020.24737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!