Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
Many digital watermarking algorithms are proposed in the literature. Broadly these watermarking algorithms can be classified into two main categories. The first category of algorithms uses a pseudo random Gaussian sequence (PRGS) watermark whereas the second category of algorithms uses a binary logo...
| Main Authors: | Potdar, Vidyasagar, Han, Song, Chang, Elizabeth, Wu, Chen |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE Computer Society Press
2006
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/13145 |
Similar Items
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)
by: Salem Hussin, Saleh Hussin
Published: (2005)
An efficient method for audio watermarking using SWT and mean value quantization
by: Mushgil, Baydaa Mohammad
Published: (2016)
by: Mushgil, Baydaa Mohammad
Published: (2016)
State-of-the-art in techniques of text digital watermarking: challenges and limitations
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
Image orientation watermarking technique for copyright protection
by: Jasim, Hend Muslim
Published: (2016)
by: Jasim, Hend Muslim
Published: (2016)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
Fingerprint Image Watermarking Using Encrypted Identification Number
by: Mustafa, Intan Shafinaz
Published: (2006)
by: Mustafa, Intan Shafinaz
Published: (2006)
Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking
by: Natgunanathan, I., et al.
Published: (2012)
by: Natgunanathan, I., et al.
Published: (2012)
Multiple image watermarking using the SILE approach
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
by: Xiang, Y., et al.
Published: (2015)
by: Xiang, Y., et al.
Published: (2015)
Watermarking technique for wireless multimedia sensor networks: A state of the art
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
Robust patchwork-based watermarking method for stereo audio signals
by: Natgunanathan, I., et al.
Published: (2013)
by: Natgunanathan, I., et al.
Published: (2013)
Hybrid QR code student attendance system using firebase and react / Muhammad Aiman Abd mutalib
by: Abd mutalib, Muhammad Aiman
Published: (2020)
by: Abd mutalib, Muhammad Aiman
Published: (2020)
Automated data process in participatory sensing using QR-code and EAN-13 barcode
by: Che Ya, Mohamad Fakhrul Syafiq
Published: (2018)
by: Che Ya, Mohamad Fakhrul Syafiq
Published: (2018)
Classification of Islamic social enterprises (ISE) in Malaysia based on economic sectors / Muhammad Iqmal Hisham Kamaruddin and Sofiah Md Auzair
by: Kamaruddin, Muhammad Iqmal Hisham, et al.
Published: (2018)
by: Kamaruddin, Muhammad Iqmal Hisham, et al.
Published: (2018)
Robust digital watermarking for compressed 3D models based on polygonal representation
by: El-Seoud, S., et al.
Published: (2013)
by: El-Seoud, S., et al.
Published: (2013)
Assessment of DNA barcoding regions for identification of Malaysian banana cultivars
by: Zulkifli, Abdul Rahman
Published: (2013)
by: Zulkifli, Abdul Rahman
Published: (2013)
A note on "Anisotropic total variation regularized L1-approximation and denoising/deblurring of 2D bar codes"
by: Dabrock, Nils, et al.
Published: (2018)
by: Dabrock, Nils, et al.
Published: (2018)
Automatic multi-modal tuning of idiophone bars
by: Zhao, Mingming
Published: (2011)
by: Zhao, Mingming
Published: (2011)
A regularization approach to blind deblurring and denoising of QR barcodes
by: van Gennip, Yves, et al.
Published: (2015)
by: van Gennip, Yves, et al.
Published: (2015)
Improving magnetic gear overload torque with cage rotor bars
by: Ackay, Yusuf, et al.
Published: (2017)
by: Ackay, Yusuf, et al.
Published: (2017)
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
by: Badawi, Bakri
Published: (2022)
by: Badawi, Bakri
Published: (2022)
Defining the ABC of gene essentiality in streptococci
by: Charbonneau, Amelia R. L., et al.
Published: (2017)
by: Charbonneau, Amelia R. L., et al.
Published: (2017)
Small two-bar specimen creep testing of Grade P91 steel at 650oC
by: Balhassn, S.M. Ali, et al.
Published: (2016)
by: Balhassn, S.M. Ali, et al.
Published: (2016)
Being cool is risky business: Young men’s within-peer-group status, heavy alcohol consumption and aggression in bars
by: Dumas, T., et al.
Published: (2015)
by: Dumas, T., et al.
Published: (2015)
Soft-In Soft-Out Detection Using Partial Gaussian Approximation
by: Guo, Q., et al.
Published: (2014)
by: Guo, Q., et al.
Published: (2014)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Motion compensated video coding
by: Garnham, Nigel William
Published: (1995)
by: Garnham, Nigel William
Published: (1995)
How to obtain lattices from (f,σ,δ)-codes via a generalization of Construction A
by: Pumpluen, Susanne
Published: (2018)
by: Pumpluen, Susanne
Published: (2018)
Enhancing the corporate visual identity of Universiti Putra Malaysia
by: Fu, Chew Xiang
Published: (2011)
by: Fu, Chew Xiang
Published: (2011)
Methodologies for evaluation of high strain rate properties of composite material constituents
by: Chacko Salem, Stanley
Published: (2016)
by: Chacko Salem, Stanley
Published: (2016)
Investigation of lightning damages in glass fibre-reinforced prepreg composites
by: Gan, Chia Sheng
Published: (2019)
by: Gan, Chia Sheng
Published: (2019)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Developing smart assignment management system using Quick Response (QR) code / Wan Muhammad Khair Mohd Nasir
by: Mohd Nasir, Wan Muhammad Khair
Published: (2019)
by: Mohd Nasir, Wan Muhammad Khair
Published: (2019)
Similar Items
-
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010) -
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013) -
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)