658 results on '"digital watermark"'
Search Results
102. Studies of Quadratic Watermark Based on MD5
103. An Adaptive Semi-fragile Watermarking Algorithm Based on Wavelet Low Frequency Coefficients
104. A Tamper-Resistant Authentication Scheme on Digital Image
105. Visual Cryptography Based Watermarking: Definition and Meaning
106. Image Information Hiding Based on Binary Holography of Iterative Conjugate-Symmetric Extension
107. Counter-Forensics: Attacking Image Forensics
108. Data Hiding and Digital Watermarking
109. Data Embedding and Extraction Method for Printed Images by Log Polar Mapping
110. A Survey of Passive Image Forensics
111. A New Digital Watermarking Algorithm Based on NSCT and SVD
112. Manufacturing Informatics in Digital Manufacturing Science
113. Adaptive Wavelet Synthesis for Improving Digital Image Watermarking
114. Blind Watermark Algorithm Based on QR Barcode
115. A Reversible Watermarking Scheme for 2D Vector Maps
116. Applying BCH Error Correcting Code in Digital Watermark
117. Poor Quality Watermark Barcodes Image Enhancement
118. Robust Image Content Authentication Using Perceptual Hashing and Watermarking
119. Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics
120. Secure Watermarking on 3D Geometry via ICA and Orthogonal Transformation
121. Improving Watermark Resistance against Removal Attacks Using Orthogonal Wavelet Adaptation
122. A Tool Box
123. Digital Museum
124. eSettlement
125. A Wavelet Domain Digital Image-Watermarking by Double Encryption Based on Arnold Transform and Chaos
126. Maintaining Sovereignty over Personal Data in Social Networking Sites
127. Image Content Detection Method Using Correlation Coefficient between Pixel Value Histograms
128. Data Leakage Tracking – Non-Repudiation of Forwarding
129. Content-Based Image Authentication Framework with Semi-fragile Hybrid Watermark Scheme
130. Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure
131. Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
132. Quality Evaluation of Digital Image Watermarking
133. Cryptography Basics
134. Paul Bloore : TinEye/Idée
135. INCREASE OF STABILITY AT JPEG COMPRESSION OF THE DIGITAL WATERMARKS EMBEDDED IN STILL IMAGES
136. FPGA Based Design of Robust Spatial Domain Image Watermarking Algorithm
137. A New SVD Based Watermarking Framework in Fractional Fourier Domain
138. Robust Multiple Watermarking Using Entropy Based Spread Spectrum
139. An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization
140. WBE-Based Anti-collusion Fingerprints: Design and Detection
141. An Introduction to Robust Transform Based Image Watermarking Techniques
142. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy
143. Permuted Image DCT Watermarking
144. A Code Generation Approach for Auto-Vectorization in the Spade Compiler
145. Digital Watermarking: New Speech and Image Applications
146. An Invisible Text Watermarking Algorithm using Image Watermark
147. A Tool for Robustness Evaluation of Image Watermarking Algorithms
148. New memritive chaotic system and the application in digital watermark.
149. ВИБІР ПЕРЕВАЖНОГО АЛГОРИТМУ ВБУДОВУВАННЯ ЦИФРОВИХ ВОДЯНИХ ЗНАКІВ В ВІДЕОФАЙЛИ
150. 直升机噪声适航审定试验测试系统设计及应用.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.