Journal articles on the topic 'Watermark'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Watermark.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Palani, Aberna, and Agilandeeswari Loganathan. "Multi-image Feature Map-Based Watermarking Techniques Using Transformer." International Journal of Electrical and Electronics Research 11, no. 2 (May 30, 2023): 339–44. http://dx.doi.org/10.37391/ijeer.110214.
Full textHassan, Mohammed. "WATERMARK TECHNIQUE FOR AUTHENTICATION OF VISIBLY WATERMARK IMAGES." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 24, 2021): 121–38. http://dx.doi.org/10.55562/jrucs.v25i2.447.
Full textMokashi, Bhargavi, Vandana S. Bhat, Jagadeesh D. Pujari, S. Roopashree, T. R. Mahesh, and D. Stalin Alex. "Efficient Hybrid Blind Watermarking in DWT-DCT-SVD with Dual Biometric Features for Images." Contrast Media & Molecular Imaging 2022 (September 8, 2022): 1–14. http://dx.doi.org/10.1155/2022/2918126.
Full textJuarez-Sandoval, Oswaldo Ulises, Laura Josefina Reyes-Ruiz, Francisco Garcia-Ugalde, Manuel Cedillo-Hernandez, Jazmin Ramirez-Hernandez, and Robert Morelos-Zaragoza. "Additional Information Delivery to Image Content via Improved Unseen–Visible Watermarking." Electronics 10, no. 18 (September 7, 2021): 2186. http://dx.doi.org/10.3390/electronics10182186.
Full textTogu Novriansyah Turnip, Tegar Arifin Prasetyo, Nevi Aktasia Banjarnahor, Winda Mariana Pasaribu, and Sopian Manurung. "Application of Double Pictures to Audio Watermarking using Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) Methods." Journal of Applied Technology and Informatics Indonesia 1, no. 2 (February 8, 2022): 7–13. http://dx.doi.org/10.54074/jati.v1i2.32.
Full textZhang, Kaixuan. "Blind Digital Watermark Based on Discrete Fourier Transformation." Highlights in Science, Engineering and Technology 1 (June 14, 2022): 441–52. http://dx.doi.org/10.54097/hset.v1i.501.
Full textPeng, Li Sen, Yong Qiang Chen, and Han Ping Hu. "A Video Watermark Method Based on Chaotic Encryption." Applied Mechanics and Materials 44-47 (December 2010): 3383–87. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.3383.
Full textLi, Li, Rui Bai, Shanqing Zhang, Chin-Chen Chang, and Mengtao Shi. "Screen-Shooting Resilient Watermarking Scheme via Learned Invariant Keypoints and QT." Sensors 21, no. 19 (September 30, 2021): 6554. http://dx.doi.org/10.3390/s21196554.
Full textMareen, Hannes, Niels Van Kets, Peter Lambert, and Glenn Van Wallendael. "Fast Fallback Watermark Detection Using Perceptual Hashes." Electronics 10, no. 10 (May 13, 2021): 1155. http://dx.doi.org/10.3390/electronics10101155.
Full textD HARIKA and SYED NOORULLAH. "IMPLEMENTATION OF IMAGE AUTHENTICATION USING DIGITAL WATERMARKING WITH BIOMETRIC." international journal of engineering technology and management sciences 7, no. 1 (2023): 154–67. http://dx.doi.org/10.46647/ijetms.2023.v07i01.023.
Full textYen, Chih Ta, Ing Jr Ding, and Zong Wei Lai. "A Coded Digital Watermarking Recognition Using Neural Network Method." Applied Mechanics and Materials 284-287 (January 2013): 2961–64. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2961.
Full textZubova, Nataliia, Serhii Naumenko, and Viktor Somov. "TYPES OF WATERMARKS ON BANKNOTES AND METHODS OF THEIR IMITATION." Criminalistics and Forensics, no. 67 (August 9, 2022): 448–65. http://dx.doi.org/10.33994/kndise.2022.67.45.
Full textErnawan, Ferda, Siau-Chuin Liew, Zuriani Mustaffa, and Kohbalan Moorthy. "A Blind Multiple Watermarks based on Human Visual Characteristics." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 4 (August 1, 2018): 2578. http://dx.doi.org/10.11591/ijece.v8i4.pp2578-2587.
Full textMa, Qiang, Ling Xing, and Bin Wu. "A Semantic Watermarking Technique for Authenticating Video of H.264." Applied Mechanics and Materials 411-414 (September 2013): 1197–200. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.1197.
Full textKaur, Randeep, and Kamaljit Kaur Dhillon. "GRAYSCALE IMAGE WATERMARK DETECTION." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 100–105. http://dx.doi.org/10.24297/ijct.v3i1b.2748.
Full textCun, Xiaodong, and Chi-Man Pun. "Split then Refine: Stacked Attention-guided ResUNets for Blind Single Image Visible Watermark Removal." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 2 (May 18, 2021): 1184–92. http://dx.doi.org/10.1609/aaai.v35i2.16205.
Full textMarjuni, Aris, Ahmad Zainul Fanani, and Oky Dwi Nurhayati. "Visual Quality Improvement of Watermarked Image Based on Singular Value Decomposition Using Walsh Hadamard Transform." Cybernetics and Information Technologies 23, no. 1 (March 1, 2023): 110–24. http://dx.doi.org/10.2478/cait-2023-0006.
Full textZhang, Mengmeng, Rongrong Ni, and Yao Zhao. "A Blind Print-Recapture Robust Watermark Scheme by Calculating Self-Convolution." International Journal of Digital Crime and Forensics 11, no. 4 (October 2019): 28–49. http://dx.doi.org/10.4018/ijdcf.2019100103.
Full textTing, Grace C. W., Bok Min Goi, and S. W. Lee. "Cryptanalysis of a Fragile Watermark Based H.264/AVC Video Authentication Scheme." Applied Mechanics and Materials 145 (December 2011): 552–56. http://dx.doi.org/10.4028/www.scientific.net/amm.145.552.
Full textWang, Chunpeng, Yushuo Liu, Zhiqiu Xia, Qi Li, Jian Li, Xiaoyu Wang, and Bin Ma. "CWAN: Covert Watermarking Attack Network." Electronics 12, no. 2 (January 6, 2023): 303. http://dx.doi.org/10.3390/electronics12020303.
Full textArrazaki, Mohammed, Abdelouahed Sabri, Mohamed Zohry, and Tarek Zougari. "Adaptive image watermarking using bidimensional empirical mode decomposition." Bulletin of Electrical Engineering and Informatics 12, no. 5 (October 1, 2023): 2955–63. http://dx.doi.org/10.11591/eei.v12i5.4688.
Full textBander Albarakati, Abdullah Basuhail, Gibrael Abo Samra, Bander Albarakati, Abdullah Basuhail, Gibrael Abo Samra. "A Fuzzy Controlled Image Watermarking Based on a Dual Transform Technique." journal of king abdulaziz university computing and information technology sciences 5, no. 1 (May 27, 2016): 83–92. http://dx.doi.org/10.4197/comp.5-1.6.
Full textDr Shiv Kumar, Lakshman Ji,. "ROBUST DIGITAL WATERMARKING TECHNIQUES FOR PROTECTING COPYRIGHT." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 18, 2021): 1374–78. http://dx.doi.org/10.17762/itii.v9i1.279.
Full textS, Rohith, and B. K Sujatha. "A Novel Compressed Encrypted and Encoded Watermark Embedding Scheme for Digital Images." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 1222. http://dx.doi.org/10.14419/ijet.v7i3.12.17842.
Full textChen, Hai Peng, Xuan Jing Shen, and Ying Da Lv. "A Robust Digital Watermarking Algorithm of Identification for Image Authenticity." Applied Mechanics and Materials 121-126 (October 2011): 1873–78. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.1873.
Full textBelim, S. V., and S. N. Munko. "ALGORITHM FOR DYNAMIC FORMATION OF A DIGITAL WATERMARK IN THE PROGRAM MEMORY." Applied Mathematics and Fundamental Informatics 7, no. 4 (2020): 012–17. http://dx.doi.org/10.25206/2311-4908-2020-7-4-12-17.
Full textEmbaby, A. Al, Mohamed A. Wahby Shalaby, and Khaled Mostafa Elsayed. "FCM-Based Approach for Locating Visible Video Watermarks." Symmetry 12, no. 3 (February 27, 2020): 339. http://dx.doi.org/10.3390/sym12030339.
Full textThomas, Reji, Vibisha V, Tabassum A, and Thanuja S. "Digital Watermarking." International Research Journal of Computer Science 10, no. 05 (June 23, 2023): 124–29. http://dx.doi.org/10.26562/irjcs.2023.v1005.04.
Full textLin, Chia-Chen, Thai-Son Nguyen, and Chin-Chen Chang. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases." Symmetry 13, no. 11 (November 17, 2021): 2191. http://dx.doi.org/10.3390/sym13112191.
Full textLiu, Li, and Ji Chun Tan. "Multiple Watermarks Embedding Simultaneously to Identify Image Status Based on Fractional Fourier Transform." Advanced Materials Research 341-342 (September 2011): 758–62. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.758.
Full textMukhammad Solikhin, Yohanssen Pratama, Purnama Pasaribu, Josua Rumahorbo, and Bona Simanullang. "Analisis Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dan Discrete Fourier Transform (DFT)." Jurnal Sistem Cerdas 5, no. 3 (December 11, 2022): 155–70. http://dx.doi.org/10.37396/jsc.v5i3.192.
Full textHidayati, Indri, Mohammad Andri Budiman, and Muhammad Zarlis. "Analysis of Embedding Locations in the Subband Frequency DCT on Scanned Images." Data Science: Journal of Computing and Applied Informatics 7, no. 1 (January 31, 2023): 1–14. http://dx.doi.org/10.32734/jocai.v7.i1-10359.
Full textAditya, B. P., U. G. K. Avaneesh, K. Adithya, Akshay Murthy, R. Sandeep, and B. Kavyashree. "Invisible Semi-Fragile Watermarking and Steganography of Digital Videos for Content Authentication and Data Hiding." International Journal of Image and Graphics 19, no. 03 (July 2019): 1950015. http://dx.doi.org/10.1142/s0219467819500153.
Full textWang, Jun Jie, Qian Mo, Dong Xia Mei, and Su Li. "A Blind Watermarking Algorithm for Digital Image." Applied Mechanics and Materials 333-335 (July 2013): 1110–13. http://dx.doi.org/10.4028/www.scientific.net/amm.333-335.1110.
Full textLiu, Keyang, Weiming Zhang, and Xiaojuan Dong. "A Cloud-User Protocol Based on Ciphertext Watermarking Technology." Security and Communication Networks 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/4376282.
Full textFu, Lijun, Bei Shi, Ling Sun, Jiawen Zeng, Deyun Chen, Hongwei Zhao, and Chunwei Tian. "An Improved U-Net for Watermark Removal." Electronics 11, no. 22 (November 16, 2022): 3760. http://dx.doi.org/10.3390/electronics11223760.
Full textHuang, Hao, Yongtao Wang, Zhaoyu Chen, Yuze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma. "CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 1 (June 28, 2022): 989–97. http://dx.doi.org/10.1609/aaai.v36i1.19982.
Full textLi, Jian, Jinwei Wang, Shuang Yu, and Xiangyang Luo. "A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation." International Journal of Digital Crime and Forensics 11, no. 1 (January 2019): 100–113. http://dx.doi.org/10.4018/ijdcf.2019010108.
Full textHe, Shun, Yu Hui Li, Bo Li, and Yu Lian. "A Method about Embedding Watermark in PDF Document." Applied Mechanics and Materials 530-531 (February 2014): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.841.
Full textCao, Xiu Quan, De Ping Yu, Chao Li, and Jin Yao. "A Novel Design of Automatic Welding System for White Watermarks." Applied Mechanics and Materials 365-366 (August 2013): 52–56. http://dx.doi.org/10.4028/www.scientific.net/amm.365-366.52.
Full textLiu, Yanwei, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, and Zhen Xu. "360-Degree VR Video Watermarking Based on Spherical Wavelet Transform." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1 (April 16, 2021): 1–23. http://dx.doi.org/10.1145/3425605.
Full textReyes-Reyes, Rogelio, Clara Cruz-Ramos, Volodymyr Ponomaryov, Beatriz P. Garcia-Salgado, and Javier Molina-Garcia. "Color Image Self-Recovery and Tampering Detection Scheme Based on Fragile Watermarking with High Recovery Capability." Applied Sciences 11, no. 7 (April 2, 2021): 3187. http://dx.doi.org/10.3390/app11073187.
Full textSaturwar, Jitendra, and D. N. Chaudhari. "Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares." IRA-International Journal of Technology & Engineering (ISSN 2455-4480) 7, no. 2 (S) (July 10, 2017): 93. http://dx.doi.org/10.21013/jte.icsesd201709.
Full textHasan, Harith Raad. "Copyright Protection for Digital Certificate using Blind Watermarking Technique." Kurdistan Journal of Applied Research 3, no. 1 (June 30, 2018): 75–79. http://dx.doi.org/10.24017/science.2018.1.15.
Full textLi, Chen, Yi Yang, Kai Liu, and Lihua Tian. "A Semi-Fragile Video Watermarking Algorithm Based on H.264/AVC." Wireless Communications and Mobile Computing 2020 (June 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/8848553.
Full textWu, Yongdong, and Hweehua Pang. "A Lightweight Buyer-Seller Watermarking Protocol." Advances in Multimedia 2008 (2008): 1–7. http://dx.doi.org/10.1155/2008/905065.
Full textHassan, Nidaa Flaih, Akbas Ezaldeen Ali, Teaba Wala Aldeen, and Ayad Al-Adhami. "Video mosaic watermarking using plasma key." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 619. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp619-628.
Full textXiao, Jun, Deng Yu Li, Xiao Xu Leng, and Jiao Rao Su. "False Alarm and Missing Alarm Models of Multiple Bits Watermarking." Applied Mechanics and Materials 543-547 (March 2014): 2155–58. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2155.
Full textFavorskaya, M. N., and E. I. Savchina. "DIGITAL WATERMARKING OF 3D MEDICAL VISUAL OBJECTS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W12 (May 9, 2019): 61–67. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w12-61-2019.
Full textJiang, Jian-Wei, Tian Zhang, Wei Li, and Shu-Mei Wang. "A Quantum Image Watermarking Scheme Based on Quantum Hilbert Scrambling and Steganography about the Moiré Fringe." Quantum Engineering 2023 (March 7, 2023): 1–12. http://dx.doi.org/10.1155/2023/3746357.
Full text