• No se han encontrado resultados

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

N/A
N/A
Protected

Academic year: 2017

Share "Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment"

Copied!
5
0
0

Texto completo

Loading

Figure

Fig. 1: Watermark embedding process
Fig. 3: Two scale 2-dimensional DWT

Referencias

Documento similar

En el caso del algoritmo spread spectrum en el dominio frecuencial, los resultados en papel sobre la perceptibilidad de la marca son bajos, ya que el efecto de la marca en la señal

The aim of this research is to comparatively analyze the results in terms of literacy itself, digital skills and digital resources and experiences according to the PISA 2018 report

In my research, I mainly discussed some of the main recognition techniques and some popular machine learning algorithms in this field for more than 20 years, trying to find a

This process is activated 6 by feeding the system with a predetermined Signature Extraction Sequence (SES), which may be either manually selected or generated with an LFSR. Thus,

• Parents do express concerns in relation to risks associated with digital technologies such as accessing content that is inappropriate for their children (primarily

Different ways of nonlinear filter- ing, adaptive techniques based on the statistical ordering and a cubic spline interpolation will be shown as suitable techniques for this

A web application for the semi-automatic extraction and storage of information was developed, for extracting (digital and scanned) text, and for indexing, searching and storing

Later, we compare the success rate (the percentage of accepted token pairs given threshold for accepting a pair t) of detection algorithm with respect to modified watermarked data