Academic literature on the topic 'Watermark'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Watermark.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Watermark"
Palani, Aberna, and Agilandeeswari Loganathan. "Multi-image Feature Map-Based Watermarking Techniques Using Transformer." International Journal of Electrical and Electronics Research 11, no. 2 (May 30, 2023): 339–44. http://dx.doi.org/10.37391/ijeer.110214.
Full textHassan, Mohammed. "WATERMARK TECHNIQUE FOR AUTHENTICATION OF VISIBLY WATERMARK IMAGES." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 24, 2021): 121–38. http://dx.doi.org/10.55562/jrucs.v25i2.447.
Full textMokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.
Full textJuarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking." Electronics 10, no. 18 (September 7, 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.
Full textTogu Novriansyah Turnip, Tegar Arifin Prasetyo, Nevi Aktasia Banjarnahor, Winda Mariana Pasaribu, and Sopian Manurung. "Application of Double Pictures to Audio Watermarking using Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) Methods." Journal of Applied Technology and Informatics Indonesia 1, no. 2 (February 8, 2022): 7–13. http://dx.doi.org/10.54074/jati.v1i2.32.
Full textZhang, Kaixuan. "Blind Digital Watermark Based on Discrete Fourier Transformation." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 441–52. http://dx.doi.org/10.54097/hset.v1i.501.
Full textPeng, Li Sen, Yong Qiang Chen, and Han Ping Hu. "A Video Watermark Method Based on Chaotic Encryption." Applied Mechanics and Materials 44-47 (December 2010): 3383–87. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3383.
Full textLi, Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang, and Mengtao Shi. "Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT." Sensors 21, no. 19 (September 30, 2021): 6554. http://dx.doi.org/10.3390/s21196554.
Full textMareen, Hannes, Niels Van Kets, Peter Lambert, and Glenn Van Wallendael. "Fast Fallback Watermark Detection Using Perceptual Hashes." Electronics 10, no. 10 (May 13, 2021): 1155. http://dx.doi.org/10.3390/electronics10101155.
Full textD HARIKA and SYED NOORULLAH. "IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC." international journal of engineering technology and management sciences 7, no. 1 (2023): 154–67. http://dx.doi.org/10.46647/ijetms.2023.v07i01.023.
Full textDissertations / Theses on the topic "Watermark"
Lam, Ioi Tun. "Biometric watermark embedding in document images." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2130131.
Full textXu, Xin. "Digital watermark technology in security applications." Thesis, University of Plymouth, 2008. http://hdl.handle.net/10026.1/335.
Full textWoo, Chaw-Seng. "Digital image watermarking methods for copyright protection and authentication." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16457/1/Chaw-Seng_Woo_Thesis.pdf.
Full textWoo, Chaw-Seng. "Digital image watermarking methods for copyright protection and authentication." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16457/.
Full textJiang, Feng. "Efficient Public-Key Watermark Techniques for Authentication." Thesis, Purdue University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10618833.
Full textThe security of digital media content has received significant attention as the usage of multimediahas increased in today's society. Digital watermarking is widely applied for digital image copyright protection and authentication. The extraction and verification of the watermark can be used for many applications, for example, authenticating the image. In some situations, the authentication should be accessible to all, thus public-key watermarking would be necessary.
In addition, many essential image-embedded documents are kept in a physical format and used widely for authentication purposes. These documents include the personal ID, license, passport, immigration document, commercial ticket with identity information, personal medical report, etc.
A digital watermarking system with high embedding capacity, robust to various attacks, high extraction efficiency is needed for such practical use. A public-key watermarking system is proposed for such applications. The embedded watermark/message can be extracted and verified publicly using a public-key. The watermark extraction process is efficient and blind. The watermark can be only embedded by the document issuer. The watermark embedded is robust against not only common digital signal processing attacks, geometric attacks but also the print-scan process. Differing from existing watermarking approaches, the watermark is embedded according to the result of proposed object weight map detection and automatic object segmentation. Higher watermark robustness and embedding capacity are achieved. Our simulation results demonstrate that the proposed approach is effective and is able to be applied to various applications.
Al, Faleh Al Hiary Hazem Ali Abd. "Paper-based watermark extraction with image processing." Thesis, University of Leeds, 2008. http://etheses.whiterose.ac.uk/1355/.
Full textDavis, Jacqueline M. L. "Occurrence of Erwinia Salicis in cricket-bat willow (Salix alba var caerulea)." Thesis, University of East Anglia, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296345.
Full textNoorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.
Full textWu, Pianhui. "Research on digital image watermark encryption based on hyperchaos." Thesis, University of Derby, 2013. http://hdl.handle.net/10545/305004.
Full textBarr, Mohammad. "Robust logo watermarking." Thesis, De Montfort University, 2018. http://hdl.handle.net/2086/16550.
Full textBooks on the topic "Watermark"
More sourcesBook chapters on the topic "Watermark"
Lin, Yiqing, and Waleed H. Abdulla. "Introduction." In Audio Watermark, 1–13. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_1.
Full textLin, Yiqing, and Waleed H. Abdulla. "Principles of Psychoacoustics." In Audio Watermark, 15–49. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_2.
Full textLin, Yiqing, and Waleed H. Abdulla. "Audio Watermarking Techniques." In Audio Watermark, 51–94. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_3.
Full textLin, Yiqing, and Waleed H. Abdulla. "Proposed Audio Watermarking Scheme." In Audio Watermark, 95–121. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_4.
Full textLin, Yiqing, and Waleed H. Abdulla. "Performance Evaluation of Audio Watermarking." In Audio Watermark, 123–57. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_5.
Full textLin, Yiqing, and Waleed H. Abdulla. "Perceptual Evaluation Using Objective Quality Measures." In Audio Watermark, 159–75. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-07974-5_6.
Full textMehrabi, Hamid Reza. "Digital Watermark." In Research and Advanced Technology for Digital Libraries, 49–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44796-2_5.
Full textLiu, Xinwei, Jian Liu, Yang Bai, Jindong Gu, Tao Chen, Xiaojun Jia, and Xiaochun Cao. "Watermark Vaccine: Adversarial Attacks to Prevent Watermark Removal." In Lecture Notes in Computer Science, 1–17. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-19781-9_1.
Full textWang, Feng-Hsing, Jeng-Shyang Pan, and Lakhmi C. Jain. "Genetic Watermark Modification." In Innovations in Digital Watermarking Techniques, 119–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03187-8_8.
Full textD’Angelo, Angela, Giacomo Cancelli, and Mauro Barni. "Watermark-Based Authentication." In Studies in Computational Intelligence, 365–402. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11756-5_16.
Full textConference papers on the topic "Watermark"
Guo, Shangwei, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, and Yang Liu. "Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/500.
Full textNitsuwat, Supot, and J. Srisomphun. "Security in CAI Materials by Embedding Digital Watermarks." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2626.
Full textMarques, Douglas Aurélio, Karina M. Magalhães, and Ricardo R. Dahab. "RAWVec – A Method for Watermarking Vector Maps." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2007. http://dx.doi.org/10.5753/sbseg.2007.20921.
Full textThongkor, Kharittha, and Thumrongrat Amornraksa. "Improved watermark extraction for printed and scanned watermarked document." In 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ispacs.2011.6146097.
Full textLI, QIUYAN, QINGHUA MENG, WENJU GAO, SHUFAN YANG, and MING JIANG. "DIGITAL WATERMARK." In Proceedings of the Third International Conference on WAA. World Scientific Publishing Company, 2003. http://dx.doi.org/10.1142/9789812796769_0155.
Full textSeadle, Michael, J. R. Deller, and Aparna Gurijala. "Why watermark?" In the second ACM/IEEE-CS joint conference. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/544220.544299.
Full textFujii, H., H. Sakamoto, S. Irie, and H. Yamashita. "Watermark resolution." In IEEE International Conference on Multimedia and Expo, 2001. ICME 2001. IEEE, 2001. http://dx.doi.org/10.1109/icme.2001.1237721.
Full textLiu, Yang, Zhen Zhu, and Xiang Bai. "WDNet: Watermark-Decomposition Network for Visible Watermark Removal." In 2021 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 2021. http://dx.doi.org/10.1109/wacv48630.2021.00373.
Full textJia, Xiaojun, Xingxing Wei, Xiaochun Cao, and Xiaoguang Han. "Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples." In MM '20: The 28th ACM International Conference on Multimedia. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3394171.3413976.
Full textChen, Jianbo, Xinwei Liu, Siyuan Liang, Xiaojun Jia, and Yuan Xun. "Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection." In 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2023. http://dx.doi.org/10.1109/cvprw59228.2023.00228.
Full textReports on the topic "Watermark"
Ahmed, Farid, and Ira S. Moskowitz. The Binary Phase Only Filter as an Image Watermark. Fort Belvoir, VA: Defense Technical Information Center, January 2004. http://dx.doi.org/10.21236/ada465428.
Full textCheng, Samuel, Heather Yu, and Zixiang Xiong. Error Concealment of MPEG-2 AAC Audio Using Modulo Watermarks. Fort Belvoir, VA: Defense Technical Information Center, January 2002. http://dx.doi.org/10.21236/ada413996.
Full textFletcher, John. Geologic Map of the Mitchel Range and Waterman Hills. Geological Society of America, 1999. http://dx.doi.org/10.1130/1999-fletcher-watermanhills.
Full textBank's Property - Works of Art - General - Watermark portrait of Her Majesty the Queen, prepared by Portals Ltd. of London and presented to the Bank in 1954. Reserve Bank of Australia, March 2022. http://dx.doi.org/10.47688/rba_archives_pn-002448.
Full textField and laboratory data from an earthquake history study of the Waterman Point Fault, Kitsap County, Washington. US Geological Survey, 2003. http://dx.doi.org/10.3133/mf2423.
Full text