S Ge, J Fei, Z Xia, Y Tong, J Weng… - IET Image Processing, 2023 - Wiley Online Library
With the advent of the screen‐reading era, the confidential documents displayed on the screen can be easily captured by a camera without leaving any traces. Thus, this paper …
C Qin, X Li, Z Zhang, F Li, X Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, an effective print-camera (PC) resistant image watermarking scheme is proposed. To achieve watermark robustness, most of existing works try to simulate PC noise …
W Chen, N Ren, C Zhu, Q Zhou, T Seppänen… - Applied Sciences, 2020 - mdpi.com
The screen-cam process, which is taking pictures of the content displayed on a screen with mobile phones or cameras, is one of the main ways that image information is leaked …
Smartphone watermarking has many potential applications but also many challenging issues such as being able to withstand print-cam attacks. These include perspective …
This paper proposes a joint encryption and screen-cam robust watermarking scheme. This method combines the advantages of smartphone, encryption and watermarking …
Cyber-theft of trade secrets has become a serious business threat. Digital watermarking is a popular technique to assist in identifying the source of the file leakage, whereby a unique …
Quick response (QR) codes have been widely used in mobile applications, especially mobile payments, such as Alipay, WeChat, PayPal, etc due to their convenience and the …
Cyber-theft of trade secrets has become a serious business threat. Digital watermarking is a popular technique to help identify the source of the file leakage, whereby a unique …
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably …