T Liu, W Zhang, S Yan - Mechanical Systems and Signal Processing, 2015 - Elsevier
In this paper, a multi-scale image enhancement algorithm based on low-passing filtering and nonlinear transformation is proposed for infrared testing image of the de-bonding defect …
A Palani, A Loganathan - Int J Electr Electron Res, 2023 - academia.edu
░ ABSTRACT-Nowadays, protecting multimedia data is a significant challenge because of the advancement of technology and software. The embedding process heavily relies on …
R Choudhary, G Parmar - 2016 2nd International Conference …, 2016 - ieeexplore.ieee.org
The exponential growth in digital data over the internet has increased the requirement of a robust and high quality watermarking techniques. In general, the image watermarking …
M Ghazvini, EM Hachrood, M Mirzadi - Journal of Applied Security …, 2017 - Taylor & Francis
Digital watermarking is a technique for resolving copyright law in E-Commerce. In this article a combined watermarking method based on Discrete Wavelet Transform (DWT) and …
R Singh, P Rawat, P Shukla - 2nd IET international conference …, 2017 - ieeexplore.ieee.org
Watermarking is a data authentication technique which embeds the watermark data within the original image in order to claim for copyright protection. Watermark techniques must be …
In medical applications, the slightest distortion in the patient's medical image cannot be tolerated, as such distortion can lead to misdiagnoses and misleading conclusions. The …
Z Shokrollahi, M Yazdi - J. Inf. Hiding Multim. Signal Process., 2017 - bit.nkust.edu.tw
Image watermarking is being used for proving the authenticity of images and videos. Concerning web applications, image watermarking is increasingly used to attest the …
Z Jiang, CM Pun, XC Yuan, T Liu - arXiv preprint arXiv:2302.03837, 2023 - arxiv.org
A new local watermarking method based on histogram shifting has been proposed in this paper to deal with various signal processing attacks (eg median filtering, JPEG compression …
Due to development of the internet technologies and other services, requirement of rightful ownership and copyright is highly required. Hence to protect the copyrighted data from …