4.6 Article

PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An improved robust image-adaptive watermarking with two watermarks using statistical decoder

Preeti Bhinder et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

Lossless digital image watermarking in sparse domain by using K-singular value decomposition algorithm

Farah Deeba et al.

IET IMAGE PROCESSING (2020)

Article Computer Science, Information Systems

High-Capacity Data Hiding for ABTC-EQ Based Compressed Image

Cheonshik Kim et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

A zero-watermarking scheme for three-dimensional mesh models based on multi-features

Xinyn Wang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Multipurpose watermarking scheme via intelligent method and chaotic map

Baiying Lei et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates

Fei Peng et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Improved multiple secret sharing using generalized chaotic image scrambling

Heri Prasetyo et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Security of 3D-HEVC transmission based on fusion and watermarking techniques

W. El-Shafai et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization

Lina Zhang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm

M. Veni et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

A generic watermarking model for object relational databases

Vidhi Khanduja et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Hyperchaos permutation on false-positive-free SVD-based image watermarking

Jing-Ming Guo et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Lossless data hiding for absolute moment block truncation coding using histogram modification

Cheonshik Kim et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2018)

Article Computer Science, Information Systems

An image steganography method based on integer wavelet transform

Aref Miri et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Which gray level should be given the smallest cost for adaptive steganography?

Yao Wei et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Distortion function based on residual blocks for JPEG steganography

Qingde Wei et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

Separable reversible data hiding in encrypted halftone image

Cheonshik Kim et al.

DISPLAYS (2018)

Article Computer Science, Artificial Intelligence

Transportation Spherical Watermarking

Yuan-Gen Wang et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2018)

Article Computer Science, Theory & Methods

Robust Image Fingerprinting Based on Feature Point Relationship Mining

Xiushan Nie et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption

Nazir A. Loan et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Dual-source discrimination power analysis for multi-instance contactless palmprint recognition

Lu Leng et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

A new adaptive image steganography scheme based on DCT and chaotic map

Marwa Saidi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

LSB based non blind predictive edge adaptive image steganography

Soumendu Chakraborty et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform

Xin Liao et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Artificial Intelligence

3D model watermarking algorithm robust to geometric attacks

Yinghui Wang et al.

IET IMAGE PROCESSING (2017)

Article Computer Science, Information Systems

FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks

Mohsen A. M. El-Bendary

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

Data embedding in digital images using critical functions

Xin Liao et al.

SIGNAL PROCESSING-IMAGE COMMUNICATION (2017)