DIGITAL_WATERMARKING

作品数:69被引量:96H指数:5
导出分析报告
相关作者:张达治孙晓燕邵辰陈立全卢苗更多>>
相关机构:湖南大学华中科技大学华中师范大学吉林大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划福建省自然科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking
《Computers, Materials & Continua》2025年第5期3135-3163,共29页Shu-Chuan Chu Libin Fu Jeng-Shyang Pan Xingsi Xue Min Liu 
Evolutionary algorithms have been extensively utilized in practical applications.However,manually designed population updating formulas are inherently prone to the subjective influence of the designer.Genetic programm...
关键词:Cat swarm algorithm genetic programming digital watermarking update mode mode generation framework 
Joint Watermarking and Encryption for Social Image Sharing
《Computers, Materials & Continua》2025年第5期2927-2946,共20页Conghuan Ye Shenglong Tan Shi Li Jun Wang Qiankun Zuo Bing Xiong 
funded by NSFC Grants 61502154,61972136,the NSF of Hubei Province(2023AFB004,2024AFB544);Hubei Provincial Department of Education Project(No.Q20232206);Project of Hubei University of Economics(No.T201410).
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social...
关键词:Multimedia security digital watermarking image encryption image sharing privacy protection 
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
《Computers, Materials & Continua》2025年第1期73-102,共30页Zhimao Lai Saad Arif Cong Feng Guangjun Liao Chuntao Wang 
supported by the National Fund Cultivation Project from China People’s Police University(Grant Number:JJPY202402);National Natural Science Foundation of China(Grant Number:62172165).
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed...
关键词:Deepfake proactive forensics digital watermarking TRACEABILITY detection techniques 
CSRWA:Covert and Severe Attacks Resistant Watermarking Algorithm
《Computers, Materials & Continua》2025年第1期1027-1047,共21页Balsam Dhyia Majeed Amir Hossein Taherinia Hadi Sadoghi Yazdi Ahad Harati 
Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright.The watermark is embedded in significant spatial or frequency features of the media to make it more resi...
关键词:Covert attack digital watermarking DnCNN JND perceptual model ROBUSTNESS 
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
《Computer Systems Science & Engineering》2024年第3期759-771,共13页Manal Abdullah Alohali Muna Elsadig Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 
funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Research Groups Program Grant No.(RGP-1443-0051).
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica...
关键词:Content authentication tampering attacks detection model SECURITY digital watermarking 
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
《Journal of Information Security》2023年第4期422-436,共15页Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen...
关键词:Discrete Wavelet Transform (DWT) Digital Watermarking ENCRYPTION Genetic Algorithm (GA) Residue Number System (RNS) GARN 
High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security
《Computers, Materials & Continua》2022年第11期4329-4347,共19页Wajdi Elhamzi Malika Jallouli Yassine Bouteraa 
This research work was funded by the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia through the project number(IF-PSAU-2021/01/17567)。
Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our appro...
关键词:Digital watermarking Clifford-multiwavelet transform Multiwavelet entropy LSB method RSA algorithm RSA algorithm Turbocode 3D multiresolution meshes 
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
《Computers, Materials & Continua》2022年第6期5253-5270,共18页Khalid A.El Drandaly Walid Khedr Islam S.Mohamed Ayman Mohamed Mostafa 
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin...
关键词:Information security digital watermarking information hiding histogram shifting technique 
Local Features-Based Watermarking for Image Security in Social Media被引量:1
《Computers, Materials & Continua》2021年第12期3857-3870,共14页Shady Y.El-mashad Amani M.Yassen Abdulwahab K.Alsammak Basem M.Elhalawany 
The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,cop...
关键词:Digital watermarking LSB social media blob detection image security 
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
《Journal of Computer and Communications》2020年第12期123-133,共11页Jiangui Zhang Huibin Qi 
Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and o...
关键词:Digital Watermarking Data Mining Discrete Radon Transform Tight Frame Copyright Protection Information Hiding Finite-Set 
检索报告 对象比较 聚类工具 使用帮助 返回顶部