micronized 发表于 2025-3-26 21:00:44

http://reply.papertrans.cn/28/2799/279891/279891_31.png

亲属 发表于 2025-3-27 04:40:13

0302-9743 arance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication usin

Anthem 发表于 2025-3-27 06:32:49

https://doi.org/10.1007/978-3-322-99821-7ories: 1) Those developed for fragile authentication; 2) Those developed for achieving high data embedding capacity; 3) Those developed for semi-fragile authentication. In each category, some prominent representatives are selected. The principles, merits, drawbacks and applications of these algorithms are analyzed and addressed.

被诅咒的人 发表于 2025-3-27 12:41:56

https://doi.org/10.1007/978-3-531-93353-5 be adapted to characteristics of human visual system. As a result, the watermark visibility is noticeably decreased, while at the same time enhancing its energy. The theoretic analysis of the detector is done to illustrate the affect of the filter on detection value. And the experimental results prove the effectiveness of the new approach.

沉思的鱼 发表于 2025-3-27 15:28:36

Rudolf Egg,Cathrin Schauer,Peter Köhler transcoding. We analyzed the effect of video transcoding for watermark signal. Based on the analysis, metadata based approach is proposed to keep watermark in the video transcoding under QoS guaranteeing service environment. We performed experiments with widely used watermark algorithms to verify that the proposed watermarking system is useful.

不能逃避 发表于 2025-3-27 20:09:11

Jörg M. Fegert,Miriam Rassenhoferression and expansion functions and keeps the distortion small between the marked image and the original one. Experimental results show that this scheme outperforms the state-of-the-art reversible data hiding schemes.

集中营 发表于 2025-3-28 01:05:31

Reversible Data Hiding hiding community. In this study, the existing reversible data hiding algorithms, including some newest schemes, have been classified into three categories: 1) Those developed for fragile authentication; 2) Those developed for achieving high data embedding capacity; 3) Those developed for semi-fragi

ODIUM 发表于 2025-3-28 02:38:30

http://reply.papertrans.cn/28/2799/279891/279891_38.png

贪心 发表于 2025-3-28 09:07:47

Informed Detection Revisited detection, recent work has focused on blind detection, because it is considered more challenging and general. Further, recent work on “dirty-paper watermarking” has suggested that informed detection provides no benefits over blind detection..This paper discusses the dirty-paper assumptions and ques

BULLY 发表于 2025-3-28 14:05:25

A Counter-Geometric Distortions Data Hiding Scheme Using Double Channels in Color Imagesby a 6-parameters affine transformation. Our scheme is designed for color images, which is combined with error-correcting code, double-channels steganography, feature point extraction, and triangle warping. Two color spaces of RGB images are considered two independent channels, one for synchronizati
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Digital Watermarking; Third International Ingemar J. Cox,Ton Kalker,Heung-Kyu Lee Conference proceedings 2005 Springer-Verlag Berlin Heide