Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - watermarking
Search - watermarking - List
DL : 0
Research paper for watermarking for the multimedia data.
Update : 2024-05-17 Size : 1523712 Publisher : Rajan1

This is my implementation about Watermarking.
Update : 2024-05-17 Size : 16384 Publisher : nessrine

watermarking in image
Update : 2024-05-17 Size : 3773440 Publisher : navu

DL : 0
digital watermarking
Update : 2024-05-17 Size : 33792 Publisher : friendlystar

OtherLSB
DL : 0
insertion and extraction of fragile watermarking
Update : 2024-05-17 Size : 166912 Publisher : io.lopes

DL : 0
Digital Watermarking by DWT
Update : 2024-05-17 Size : 1024 Publisher : io.lopes

High Capacity Reversible Watermarking for Audio by Histogram
Update : 2024-05-17 Size : 1360896 Publisher : Rajan007

DL : 0
Audio Watermarking Scheme Based on Singular Spectrum Analysis
Update : 2024-05-17 Size : 1556480 Publisher : Rajan007

DL : 0
Audio Watermarking by ModifyingStatistical Features in Time Domain
Update : 2024-05-17 Size : 1345536 Publisher : Rajan007

DL : 0
A Robust Blind Audio Watermarking Scheme Based on Singular Value Decomposition and Neural Networks
Update : 2024-05-17 Size : 238592 Publisher : Rajan007

OtherT66
DL : 0
Robust, high capacity and perceptual quality image watermarking in DWT domain
Update : 2024-05-17 Size : 1856512 Publisher : Rajan007

DL : 0
simulate the "An Improved DWT-SVD Based Robust Digital Image Watermarking for Color Image" in Matlab
Update : 2024-05-17 Size : 850944 Publisher : fallahtafti

DL : 0
SPATIAL DOMAIN WATERMARKING WITHOUT CONTENT ALTERATION
Update : 2024-05-17 Size : 547840 Publisher : KUMARAN

DL : 0
Image watermarking using wavelet features
Update : 2024-05-17 Size : 1163264 Publisher : KUMARAN

semi fragile watermarking of wavelet
Update : 2024-05-17 Size : 20625408 Publisher : Dwei3

鲁棒数字音频盲水印水印置乱算法实现基于阿诺德变换的离散小波变换,离散余弦变换(Robust Blind Digital Audio Watermarking Implementation Based on Watermark Scrambling Algorithm-Arnold Transform Discrete Wavelet Transform,Discrete Cosine Transform,Erro Correcting Code)
Update : 2024-05-17 Size : 24991744 Publisher : xxxkke

simple example to Implementing Watermarking using discrete 2-D wavelet transform.
Update : 2024-05-17 Size : 52224 Publisher : ali1076

基于lsb的音频水印程序,能正确运行,希望有用(Audio watermarking program based on LSB)
Update : 2019-05-06 Size : 1690624 Publisher : 雪玉血123

Watermarking is a process in which both physical and digital media are marked using watermarks in order to protect ownership of the watermarked media. Digital water- marking is a technique where a watermark gets embedded into the carrier signal while preserving the quality of the original media. Embedding can happen in various domains and could be both hidden and plain, but the quality and the information carried by the signal should not deteriorate. This paper deals with hiding watermarks into speech audio signals using deep neural networks. We present an encoder-decoder architecture that achieved PSNR value greater than 57dB, which we used as a preservation measure of the original signal and message transmission accuracy of almost 100%. Audio data, used in this paper, consists of speeches from the Parliament of Montenegro.
Update : 2021-05-05 Size : 1057925 Publisher : bamzi334

Watermarking is an operation of embedding infor- mation into an image in a way that allows to identify ownership of the image despite applying some distortions on it. In this paper, we present a novel end-to-end solution for embedding and recovering the watermark in the digital image using convolutional neural networks. We propose a spreading method of the message over the spatial domain of the image, hence reducing the local bits per pixel capacity and significantly increasing robustness. To obtain the model we use adversarial training, apply noiser layers between the encoder and the decoder, and implement a precise JPEG approximation. Moreover, we broaden the spectrum of typically considered attacks on the watermark and we achieve high overall robustness, most notably against JPEG compression, Gaussian blur, subsampling or resizing. We show that an appli- cation of some attacks could increase robustness against other non-seen during training distortions across one group of attacks — a proper grouping of the attacks according to their scope allows to achieve high general robustness
Update : 2021-05-05 Size : 774757 Publisher : bamzi334
« 1 2 ... 40 41 42 43 44 4546 47 48 49 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.