• Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Communications
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • in-memomoriam
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • serologic-method-review
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls


Article | 08-April-2018

Image Watermarking Encryption Scheme Based on Fractional Order Chaotic System

Now the chaotic system and wavelet transform are more and more widely used in the watermarking technology. At the same time, the fractional order chaotic system has more complex dynamic characteristics than the integer order system. So a new image watermarking scheme based on the fractional order Chen chaotic system and discrete wavelet transform is proposed. Chaotic sequences generated by chaotic system are used to encrypt the watermark image, and the processed watermark information is

Dawei Ding, Zongzhi Li, Shujia Li

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 79–89

Article | 01-March-2015


In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression is obviously insufficient. The proposed embedded in the carrier image on the dual watermark includes a two watermark image and a gray image watermarking algorithm, the persuasive power while maintaining the original two values of the watermark robustness at the same time, improve the watermark information. In order to balance the robustness

Zhu Yuefeng, Lin Li

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 199–219

Article | 08-April-2018

A DCT Domain Image Watermarking Method Based on Matlab

In the text, A method of image watermarking based on DCT (Discrete Cosine Transform) domain algorithm is proposed and verified in experiment by Matlab. The experimental result shows that the current method can achieve embedding with sound robustness and invisibility. From the experimental results, the quality of the watermarked image is almost no decline relative to the original.

Wu He-Jing

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 38–45

Article | 01-December-2016


Digital image watermark has been studied as object. It analyzed the typical digital watermark algorithms based on the space domain and transform domain and key researched watermarking algorithm based on discrete wavelet transform. It has designed and improved blind watermarking algorithm and color image watermarking algorithm. Finally, based on the two improved watermarking algorithm, it has designed a dual watermarking algorithm. Both are separated but related. It authenticates dual

Fang Yinglan, Han Bing, Zhang Yongmei, Tian Lin

International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 2167–2185

No Record Found..
Page Actions