2013 a robust multiple watermarking scheme based on the DWT x

2013  a robust multiple watermarking scheme based on the DWT x

2013 a robust multiple watermarking scheme based on the DWT x

... De vices (SSD) Hammamet, Tunisia, Marc h 18-21, 2013 SSD'13 1569695081 A Robust Multiple Watermarking Scheme Based on the DWT Ouazzane Hana, Mahersia Hela, Hamrouni Kamel Université ... d’insertion optimal,” Coresa03, 2003. [9] S. Rastegar, F. Namazi, K. Yaghmaie and A. Aliabadian, “Hybrid watermarking algorithm based on singula...
Ngày tải lên : 21/11/2013, 23:58
  • 12
  • 344
  • 0
2013  a robust multiple watermarking scheme based on the DWT

2013 a robust multiple watermarking scheme based on the DWT

... original watermark to check the watermark presence in the attacked image. For objective examination, they calculate the similarity ratio (SR) between each extracted watermark and the original one ... present a new watermarking scheme based on the DWT. This transform is commonly used in digital watermarking because of its advantages. Keyvanpour and Merrikh-Bayat pro...
Ngày tải lên : 30/12/2013, 16:22
  • 6
  • 428
  • 0
Báo cáo hóa học: "A New Repeating Color Watermarking Scheme Based on Human Visual Model" doc

Báo cáo hóa học: "A New Repeating Color Watermarking Scheme Based on Human Visual Model" doc

... create a master watermark share and a secret wa- termark share. The watermark share is kept secret by the owner. The master watermark share is embedded into the host image to generate a watermarked ... watermarked image based on the human visual model. The proposed method conforms to all necessary conditions of an image watermarking technique. After the watermarked i...
Ngày tải lên : 23/06/2014, 01:20
  • 8
  • 238
  • 0
Báo cáo hóa học: " A Complete Image Compression Scheme Based on Overlapped Block Transform with Post-Processing" pptx

Báo cáo hóa học: " A Complete Image Compression Scheme Based on Overlapped Block Transform with Post-Processing" pptx

... to the lattice factorization in (1), the factorization in (4)isageneralfactorizationthatcoversall linear-phase paraunitary filter banks with M even and length L = MN. Based on our analysis, there ... Naval Air War- fare Center Weapons Division ( NAWCWD) at China Lake, Calif. He currently serves as an Associate Editor of the IEEE Transactions on Signal Processing as well as IEEE Tra...
Ngày tải lên : 22/06/2014, 22:20
  • 15
  • 327
  • 0
Báo cáo hóa học: " Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors Yann Bodo" pdf

Báo cáo hóa học: " Video Waterscrambling: Towards a Video Protection Scheme Based on the Disturbance of Motion Vectors Yann Bodo" pdf

... process. The other drawback concerns the accumulation of the same approximation error in the temporal axis generating a drift effect. During our experiments, the first attack gave better results than the ... publications that have appeared as journal papers or pro- ceeding articles, 3 book chapters, and 3 international patents. He gave several tutorials on digital watermarking...
Ngày tải lên : 23/06/2014, 01:20
  • 14
  • 580
  • 0
Báo cáo khoa học: "a Chat-oriented Dialogue System based on the Vector Space Model" ppt

Báo cáo khoa học: "a Chat-oriented Dialogue System based on the Vector Space Model" ppt

... at each dialogue turn. On the other hand, context elements contain all the additional information (explanations and descriptions) appearing in the scripts. 39 mistakenly stored in the data ... basic elements are extracted from the scripts: speakers, utterances and context. The speaker and utterance elements contain information about the characters who speak and what th...
Ngày tải lên : 07/03/2014, 18:20
  • 6
  • 498
  • 0
Báo cáo hóa học: " Research Article Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique Minoru Kuribayashi (EURASIP Member)" docx

Báo cáo hóa học: " Research Article Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique Minoru Kuribayashi (EURASIP Member)" docx

... Transform: Algorithms, Advantages, Applications, Academic Press, Boston, Mass, USA, 1990. [17] M. Barni, F. Bartolini, and A. Piva, “Improved wavelet -based watermarking through pixel-wise masking,” ... that the computational costs required for calculating the sum of difference is much smaller than that of the detection operation. For a comparison of the computational complexitie...
Ngày tải lên : 21/06/2014, 05:20
  • 16
  • 311
  • 0
Báo cáo hóa học: " Research Article A Stereo Crosstalk Cancellation System Based on the Common-Acoustical Pole/Zero Model" docx

Báo cáo hóa học: " Research Article A Stereo Crosstalk Cancellation System Based on the Common-Acoustical Pole/Zero Model" docx

... of the crosstalk cancellation algorithm is crucial for practical applications. To reduce the computational cost, this paper presents a novel crosstalk cancellation system based on common-acoustical ... computational efficiency [23, 24]. The acoustic paths from loudspeakers to ears are approx- imated with CAPZ models, then the crosstalk cancellation filters are designed based on...
Ngày tải lên : 21/06/2014, 08:20
  • 11
  • 267
  • 0
Báo cáo hóa học: " Research Article A Multiuser MIMO Transmit Beamformer Based on the Statistics of the Signal-to-Leakage Ratio" doc

Báo cáo hóa học: " Research Article A Multiuser MIMO Transmit Beamformer Based on the Statistics of the Signal-to-Leakage Ratio" doc

... obtained from (32)and Gaussian AoA model is used). 5.2. Spatial Correlation Model-Gaussian Angle of Arrival (AoA). In this example, the spatial correlation among ele- ments of the BS antenna array ... user- channels. The motivation behind this assumption is that the knowledge of instantaneous channel information can be available at the BS only through the feedback from users. The...
Ngày tải lên : 21/06/2014, 22:20
  • 10
  • 317
  • 0
Báo cáo " A program anomaly intrusion detection scheme based on fuzzy inference " potx

Báo cáo " A program anomaly intrusion detection scheme based on fuzzy inference " potx

... detection scheme: (a) Training stage and (b) Testing stage. • Training stage: a normal database, an HMM model and fuzzy sets are built from training data. - Normal database: The database is an ... can be seen from Table 1 that the false positive rate of the fuzzy -based detection scheme is much lower than that of the normal database scheme [4]. For example, the fuz...
Ngày tải lên : 22/03/2014, 09:20
  • 11
  • 262
  • 0

Xem thêm

Từ khóa: