[PDF][PDF] A Novel Method of Invisible Video Watermarking Based on Index Mapping and Hybrid DWT-DCT.

HT Hazim, N Alseelawi… - International Journal of …, 2023 - researchgate.net
Watermarking is widely used in multimedia preservation and communication, which
comprises, and is therefore not limited to, data security and validation. Security, readability …

Watermarking Techniques for Large Language Models: A Survey

Y Liang, J Xiao, W Gan, PS Yu - arXiv preprint arXiv:2409.00089, 2024 - arxiv.org
With the rapid advancement and extensive application of artificial intelligence technology,
large language models (LLMs) are extensively used to enhance production, creativity …

A formal study of shot boundary detection approaches—comparative analysis

H Nankani, M Mahrishi, S Morwal, KK Hiran - Soft Computing: Theories …, 2022 - Springer
In the past, video recording and video databases were relatively small. This makes the
manual keyword indexing and retrieval easy. However, in recent years, videos are now a …

Multipurpose blind watermarking algorithm for color image based on DWT and DCT

Y Zhao, Z Zhou - 2012 8th International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, a multipurpose blind watermarking algorithm for color image based on discrete
wavelet transform (DWT) and discrete cosine transform (DCT) is proposed according to the …

[PDF][PDF] An improved blind color image watermarking using DCT in RGB color space

J Jeswani, T Sarode - International Journal of Computer Applications, 2014 - academia.edu
In this paper a novel blind watermarking technique for color images using DCT has been
proposed. Inproposed technique cover image is decomposed into 3 planes, namely R, G, B …

Computational integral imaging-based 3D digital watermarking scheme using cellular automata transform and maximum length cellular automata

XW Li, SJ Cho, ST Kim - Multidimensional Systems and Signal processing, 2014 - Springer
A novel 3D watermarking algorithm by combining use of computational integral imaging (CII)
and cellular automata transform (CAT) is proposed in this paper. In this proposed scheme …

Random Modulus Decomposition for Color Images Optical Asymmetric Cryptosystem Using Gyrator Domain

A Malsaria, P Vyas, M Kaur - International Conference on Data Science …, 2023 - Springer
The area of optical color picture encryption has recently emerged as one of the most talked-
about subjects in the pitch of data security. Although it has been suggested that certain …

A Review of the Authentication Scheme Using HECC and ECC

A Srivastava, BS Rawat, G Singh… - … on Blockchain and …, 2023 - ieeexplore.ieee.org
In today's hyper-connected globe, safe and secure interaction is becoming increasingly
essential, which has raised the need for trusted verification systems. The expanding …

Blind detection attack resistant image watermarking

B Singh, VS Dhaka, R Saharan - 2014 IEEE 3rd Global …, 2014 - ieeexplore.ieee.org
A new scheme is proposed which uses the features of Discrete Cosine Transform (DCT) for
the embedding of the watermark coefficients and uses a pseudo-random sequence for …

[PDF][PDF] Transform based digital image watermarking techniques for image authentication

M Prajapati - International Journal of Emerging Technology and …, 2014 - Citeseer
In the past few years many new techniques and concepts based on data hiding have been
introduced for image authentication and copy right protection. With a lot of information …