P Zhu, J Hu, X Li, Q Zhu - IEEE Transactions on Engineering …, 2021 - ieeexplore.ieee.org
The protection of original achievements including patents and copyrights is a significant and critical issue in today's knowledge-driven economy. In this article, we propose and develop a …
Y Zhang, C Qin, W Zhang, F Liu, X Luo - Signal Processing, 2018 - Elsevier
The mainstream adaptive steganography algorithms often cannot transmit secret messages correctly when stego images suffer from JPEG compression. In this respect, researchers …
This survey presents a brief discussion of different aspects of digital image watermarking. Included in the present discussion are these general concepts: major characteristics of …
S Liu, Z Pan, H Song - IET image processing, 2017 - Wiley Online Library
With the rapid development of computer science, problems with digital products piracy and copyright dispute become more serious; therefore, it is an urgent task to find solutions for …
LH Gong, C Tian, WP Zou, NR Zhou - Multimedia tools and applications, 2021 - Springer
To enhance the invisibility and the robustness of the watermarking algorithm, a robust and imperceptible watermarking scheme is presented by combining Canny edge detection …
Y Huang, B Niu, H Guan… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Watermarking plays an important role in identifying the copyright of an image and related issues. The state-of-the-art watermark embedding schemes, spread spectrum and …
B Wang, Y Wu, G Wang - … on Circuits and Systems for Video …, 2023 - ieeexplore.ieee.org
In watermarking, the watermark embedding strength is crucial, and the introduction of the strength factor can adjust the trade-off between the quality of the encoded image and the …
Blind watermarking targets the challenging recovery of the watermark when the host is not available during the detection stage. This paper proposes Discrete Shearlet Transform …
H Sadreazami, M Amini - … on Circuits and Systems II: Express …, 2018 - ieeexplore.ieee.org
Data security is a main concern in everyday data transmissions in the Internet. A possible solution to guarantee a secure and legitimate transaction is via hiding a piece of tractable …