Blind dual image watermarking for copyright protection, tamper proofing and self-recovery
MQ Fan - Multimedia Tools and Applications, 2023 - Springer
In this paper, a blind dual image watermarking scheme for copyright protection, tamper
proofing and self-recovery is proposed. For purpose of copyright protection, we use binary …
proofing and self-recovery is proposed. For purpose of copyright protection, we use binary …
A robust watermarking approach for security issue of binary documents using fully convolutional networks
Motivated by increasing possibility of the tampering of genuine documents during a
transmission over digital channels, we focus on developing a watermarking framework for …
transmission over digital channels, we focus on developing a watermarking framework for …
A high-capacity text watermarking method based on geometric micro-distortion
X Wang, Y Jin - 2022 26th International Conference on Pattern …, 2022 - ieeexplore.ieee.org
Motivated by the increasing necessity of copyright protection for textual documents, we
propose an automatic generation method for high-capacity text watermarking that leverages …
propose an automatic generation method for high-capacity text watermarking that leverages …
A fuzzy logic based contrast and edge sensitive digital image watermarking technique
In this paper, a fuzzy logic based digital image watermarking technique is proposed. The
contrast and edge values of the host image are analyzed by the fuzzy inference system (FIS) …
contrast and edge values of the host image are analyzed by the fuzzy inference system (FIS) …
A Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks
Z Chen, Y Liu, G Ke, J Wang, W Zhao, S Lo - International Journal of …, 2024 - Springer
In recent years, related research has focused on how to safely transfer and protect the
privacy of images in social network services while providing easy access by authorized …
privacy of images in social network services while providing easy access by authorized …
Watermarking for security issue of handwritten documents with fully convolutional networks
To prevent falsification of handwriting document images, the methods of forensic document
examination are widely used to determine the origin and authenticity of a given document. In …
examination are widely used to determine the origin and authenticity of a given document. In …
Hiding security feature into text content for securing documents using generated font
Motivated by increasing possibility of the tampering of genuine documents during a
transmission over digital channels, we focus on developing a watermarking framework for …
transmission over digital channels, we focus on developing a watermarking framework for …
A robust data hiding scheme using generated content for securing genuine documents
Data hiding is an effective technique, compared to pervasive black-and-white code patterns
such as barcode and quick response code, which can be used to secure document images …
such as barcode and quick response code, which can be used to secure document images …
Optimal secure information using digital watermarking and fuzzy rule base
Digital image watermarking is one of the active area of research for data authentication and
data hiding. Imperceptibility of the image is the main aspect that confines the amount of …
data hiding. Imperceptibility of the image is the main aspect that confines the amount of …
Fuzzy logic with superpixel-based block similarity measures for secured data hiding scheme
With time, humans have realized, the internet is the best alternative for exchange of
messages through multimedia documents, especially images. Thus, its imperceptibility and …
messages through multimedia documents, especially images. Thus, its imperceptibility and …