A robust watermarking scheme in YCbCr color space based on channel coding

Y Tan, J Qin, X Xiang, W Ma, W Pan, NN Xiong - IEEE Access, 2019 - ieeexplore.ieee.org
The rapid development of big data and cloud computing technologies greatly accelerate the
spreading and utilization of images and videos. The copyright protection for images and …

Application of EcoDesign: ten years of dynamic development

A Stevels - … on Environmentally Conscious Design and Inverse …, 2001 - ieeexplore.ieee.org
The paper describes the development of Applied EcoDesign (design for environment) from
its initial stage in the early nineties to its present form and explores further developments in …

[HTML][HTML] Comparative evaluation of semi fragile watermarking algorithms for image authentication

A Tiwari, M Sharma - Journal of Information Security, 2012 - scirp.org
Technology has no limits today; we have lots of software available in the market by which we
can alter any image. People usually copies image from the internet and after some changes …

[PDF][PDF] FPGA based implementation of embedding and decoding architecture for binary watermark by spread spectrum scheme in spatial domain

S Ghosh, S Talapatra, N Chatterjee… - … Journal of Advances …, 2012 - researchgate.net
With the increasing influence of digital network and communication, armour from perilous
intrusion and corruption of information (eg image, video, speech etc) during transmission is …

A survey of transform domain based semifragile watermarking schemes for image authentication

A Tiwari, M Sharma - Journal of The Institution of Engineers (India): Series …, 2012 - Springer
Image authentication is key research area for researchers' world over due to its important
function in multimedia content authentication. Hence it's essential to check integrity of …

[PDF][PDF] Detection of scaled region duplication image forgery using color based segmentation with LSB signature

DM Uliyan, MAF Al-Husainy - International Journal Of Advanced …, 2017 - researchgate.net
Due to the availability of powerful image editing softwares, forgers can tamper the image
content easily. There are various types of image forgery, such as image splicing and region …

[PDF][PDF] Change Detection in Dynamic Scenes using Local Adaptive Transform.

H Haberdar, SK Shah - BMVC, 2013 - pdfs.semanticscholar.org
[1] W. Guo, L. Soibelman, JH Garrett Jr., Automated defect detection for sewer pipeline
inspection and condition assessment, Automation in Construction, 2009 [2] http://openi. nlm …

Color image authentication using a zone-corrected error-monitoring quantization-based watermarking technique

HM Al-Otum - Optical Engineering, 2016 - spiedigitallibrary.org
This article presents a semifragile color image watermarking technique for content
authentication. The proposed technique can be implemented with color images and embeds …

[图书][B] Region Duplication Forgery Detection Technique Based on Keypoint Matching

DMH Uliyan - 2016 - search.proquest.com
Manipulation of digital images is not considered a new thing nowadays. For as long as
cameras have existed, photographers have been staged and images have been forged and …

VLSI Architecture for Spread Spectrum Image Watermarking Using Binary Watermark

S Ghosh, S Talapatra, D Mondal… - … on Advances in …, 2012 - ieeexplore.ieee.org
In recent time protection of intellectual properties is a concern. To protect the image and
video from the unauthenticated access or tampering, watermarking is adopted as a solution …