RD-IWAN: Residual dense based imperceptible watermark attack network
Digital watermarking technology and watermark attack methods are mutually reinforcing and
complementary. Currently, traditional watermark attack methods are relatively mature, but …
complementary. Currently, traditional watermark attack methods are relatively mature, but …
Bessel-Fourier moment-based robust image zero-watermarking
G Gao, G Jiang - Multimedia Tools and Applications, 2015 - Springer
Aiming to resist various signal processing operations and geometric transformations, this
paper proposes a robust zero-watermarking algorithm based on a new image moment …
paper proposes a robust zero-watermarking algorithm based on a new image moment …
An algorithm for robust image watermarking based on the DCT and Zernike moments
An image watermarking scheme in the 2D DCT domain is proposed by exploring the
advantages of using Zernike moments. Zernike transform has been used in image …
advantages of using Zernike moments. Zernike transform has been used in image …
An approach to classification and under-sampling of the interfering wireless signals
Classification of interfering signals that belong to different wireless standards is important
topic in wireless communications. In this paper, we propose a procedure for separation and …
topic in wireless communications. In this paper, we propose a procedure for separation and …
Extraction of patterns from images using a model of combined frequency localization spaces
An algorithm for image decomposition and separation of superposed stationary
contributions is proposed. It is based on the concept of sparse-to-sparse domain …
contributions is proposed. It is based on the concept of sparse-to-sparse domain …
Blind Signals Separation in wireless communications based on Compressive Sensing
The algorithm for separation of signals from two different wireless standards (Bluetooth and
IEEE 802.11 b standard), operating within the same frequency band is proposed in this …
IEEE 802.11 b standard), operating within the same frequency band is proposed in this …
FHSS signal characterization based on the crossterms free time-frequency distributions
The application of the Cohen class time-frequency distributions has been considered for the
analysis of signals in wireless communications. Several distributions are considered …
analysis of signals in wireless communications. Several distributions are considered …
Digital video protection in the DWT-SVD domain using scrambled watermark by GMSAT algorithm
Z Veličković, Z Milivojević, M Veličković - ETF Journal of Electrical …, 2017 - jee.ucg.ac.me
In this paper, the protection of video content from copying by embedding a scrambled
watermark is considered. The watermark is scrambled by the GMSAT algorithm, and the …
watermark is considered. The watermark is scrambled by the GMSAT algorithm, and the …
A Digital Watermark Architecture for Image Authentication Based on Hermite Transform
A Draganić, Đ Stanković, N Lekić… - 2024 International …, 2024 - ieeexplore.ieee.org
The paper introduces an invisible image watermarking approach using a binary image as a
watermark in combination with the Hermite transform. By using the secret key, the binary …
watermark in combination with the Hermite transform. By using the secret key, the binary …
An Image Watermarking Based on Rayleigh Distribution Detector
This work proposes an image watermarking procedure, covering both watermark
embedding and detection. A Rayleigh distribution-based detector is proposed for watermark …
embedding and detection. A Rayleigh distribution-based detector is proposed for watermark …