Suchergebnisse - Encryption and Decryption algorithm for watermarking
Andere Suchmöglichkeiten:
- Encryption and Decryption algorithm for watermarking »
-
1
Commutative Encryption and Watermarking in Video Compression
ISSN: 1051-8215, 1558-2205Veröffentlicht: New York, NY IEEE 01.06.2007Veröffentlicht in IEEE transactions on circuits and systems for video technology (01.06.2007)“… To avoid that the watermarking operation affects the decryption operation, a traditional watermarking algorithm is modified …”
Volltext
Journal Article -
2
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking
ISSN: 0165-1684, 1872-7557Veröffentlicht: Elsevier B.V 01.12.2021Veröffentlicht in Signal processing (01.12.2021)“… •Two applications with QDFrKT are investigated, including color image encryption and color image watermarking, so as to evaluate the applicability of the proposed QDFrKT method …”
Volltext
Journal Article -
3
Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI 20.01.2021Veröffentlicht in Sensors (Basel, Switzerland) (20.01.2021)“… This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots …”
Volltext
Journal Article -
4
A watermarking framework for encrypted medical images via HC chaotic system and deep learning
ISSN: 2045-2322, 2045-2322Veröffentlicht: London Nature Publishing Group UK 14.10.2025Veröffentlicht in Scientific reports (14.10.2025)“… And based on the WHT-DCT transform, it proposes a lossless encryption algorithm …”
Volltext
Journal Article -
5
Vector geographic data commutative encryption and watermarking algorithm based on prediction differences
ISSN: 0957-4174Veröffentlicht: Elsevier Ltd 01.02.2025Veröffentlicht in Expert systems with applications (01.02.2025)“… Commutative encryption and watermarking (CEW) is a seamless integration of encryption and watermarking technologies, overcoming the limitations of single security protection methods that may fail to provide comprehensive data protection …”
Volltext
Journal Article -
6
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
ISSN: 1751-8709, 1751-8717Veröffentlicht: John Wiley & Sons, Inc 01.05.2021Veröffentlicht in IET information security (01.05.2021)“… A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret …”
Volltext
Journal Article -
7
An image decryption technology based on machine learning in an irreversible encryption system
ISSN: 0030-4018Veröffentlicht: Elsevier B.V 15.08.2023Veröffentlicht in Optics communications (15.08.2023)“… information using the phase recovery algorithm and the conventional decryption method, so this is an irreversible coding system …”
Volltext
Journal Article -
8
A multipermutation superposition coding-based fragile watermarking for probabilistic encryption
ISSN: 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.09.2022Veröffentlicht in Multimedia tools and applications (01.09.2022)“… Without decryption, the proposed algorithm realizes integrity verification and tamper localization in the ciphertext domain and also embeds a large-capacity meaningful watermark, which is rare for fragile watermarking …”
Volltext
Journal Article -
9
Optical cryptosystems
ISBN: 9780750322188, 0750322187, 9780750322218, 0750322217Veröffentlicht: Bristol England (Temple Circus, Temple Way, Bristol BS1 6HG, UK) IOP Publishing 2020“… Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification …”
Volltext
E-Book -
10
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking
ISSN: 1556-6013, 1556-6021Veröffentlicht: New York IEEE 2024Veröffentlicht in IEEE transactions on information forensics and security (2024)“… To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting the previously embedded watermark from the screen-shot image …”
Volltext
Journal Article -
11
An Approach towards an Efficient Encryption-Decryption of Grayscale and Color Images
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2019Veröffentlicht in Procedia computer science (2019)“… The paper considers a new, authors-developed approach to encryption-decryption of grayscale and color images, which is based on the RSA algorithm …”
Volltext
Journal Article -
12
A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology
ISSN: 2168-2194, 2168-2208, 2168-2208Veröffentlicht: United States IEEE 01.05.2014Veröffentlicht in IEEE journal of biomedical and health informatics (01.05.2014)“… The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption …”
Volltext
Journal Article -
13
Combining double random phase encoding for color image watermarking in quaternion gyrator domain
ISSN: 0030-4018, 1873-0310Veröffentlicht: Elsevier B.V 15.05.2015Veröffentlicht in Optics communications (15.05.2015)“… In this study, a joint encryption/watermarking system with more security based on double random phase encoding (DRPE …”
Volltext
Journal Article -
14
Video fingerprinting and encryption principles for digital rights management
ISSN: 0018-9219, 1558-2256Veröffentlicht: New York IEEE 2004Veröffentlicht in Proceedings of the IEEE (2004)“… This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption …”
Volltext
Journal Article -
15
6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2021Veröffentlicht in IEEE access (2021)“… A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT …”
Volltext
Journal Article -
16
Tchebichef moments and bat optimization algorithm-based information hiding and authentication of medical gray level images
ISSN: 2511-2104, 2511-2112Veröffentlicht: Singapore Springer Nature Singapore 01.01.2024Veröffentlicht in International journal of information technology (Singapore. Online) (01.01.2024)“… This research work focuses on image encryption as well as the watermarking approach that enables the transfer of secret images as well as the hiding of data …”
Volltext
Journal Article -
17
Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2016Veröffentlicht in Procedia computer science (2016)“… In this paper the embedded information is applied as text. Before embedding the text in image, text is encrypted using Advanced Encryption Standard (AES) algorithm …”
Volltext
Journal Article -
18
A Robust Digital Audio Watermarking Algorithm
ISSN: 2831-431XVeröffentlicht: IEEE 15.12.2023Veröffentlicht in IEEE International Conference on Electronics and Communication Engineering (Online) (15.12.2023)“… Aiming at the problems of insufficient embedding strength and single attack mode, this paper proposes a robust digital audio watermarking algorithm for binary images …”
Volltext
Tagungsbericht -
19
Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains
ISSN: 1556-6013, 1556-6021Veröffentlicht: New York IEEE 2020Veröffentlicht in IEEE transactions on information forensics and security (2020)“… In this paper, we propose the first joint watermarking-encryption-compression scheme for the purpose of protecting of medical images …”
Volltext
Journal Article -
20
Robust and blind watermarking using Arnold 4D cat map in discrete wavelet
ISSN: 2511-2104, 2511-2112Veröffentlicht: Singapore Springer Singapore 01.06.2020Veröffentlicht in International journal of information technology (Singapore. Online) (01.06.2020)“… Though watermarking got attention in the past decade, its robustness and security remain as a challenge to the researchers …”
Volltext
Journal Article

