Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Communications
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Letter to the Editor
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • in-memomoriam
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • original-report
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • serologic-method-review
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems
  • International Journal Advanced Network Monitoring Controls

 

Article | 08-April-2018

Image Watermarking Encryption Scheme Based on Fractional Order Chaotic System

embedded into the original image by the discrete wavelet transform. Finally, the security analysis of the proposed watermarking algorithm is presented. The experimental results show that the proposed watermarking scheme has high security, and it has stronger robustness and invisibility compared with the previous work.

Dawei Ding, Zongzhi Li, Shujia Li

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 79–89

Article | 08-April-2018

A DCT Domain Image Watermarking Method Based on Matlab

In the text, A method of image watermarking based on DCT (Discrete Cosine Transform) domain algorithm is proposed and verified in experiment by Matlab. The experimental result shows that the current method can achieve embedding with sound robustness and invisibility. From the experimental results, the quality of the watermarked image is almost no decline relative to the original.

Wu He-Jing

International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 38–45

Article | 01-March-2015

DIGITAL IMAGE WATERMARKING ALGORITHMS BASED ON DUAL TRANSFORM DOMAIN AND SELF-RECOVERY

and invisibility of watermarking algorithm, this paper analyzes the embedding position and strategy of transform domain algorithms, the DC coefficient in the carrier image is divided into blocks of DCT spectrum and spectrum on the combination of DWT coefficient method and the advantage of embedded dual watermarking, and use the NEC characteristic of the algorithm is improved adaptive based on the embedded mode. The gray image watermark bit plane decomposition compression high four bit plane

Zhu Yuefeng, Lin Li

International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 199–219

No Record Found..
Page Actions