Advanced search

Showing result 1 - 5 of 6 essays matching the above criteria.

  1. 1. Analyzing the efficacy of the FFT in Image Denoising and DigitalWatermarking

    University essay from Mälardalens universitet/Akademin för utbildning, kultur och kommunikation

    Author : Emil Fagerström; [2023]
    Keywords : FFT; Image Denoising; Digital Watermarking;

    Abstract : The FFT has been a staple in the field of mathematics and computer science for almost 60 years. And yet, it still endures as an efficient algorithm in a multitude of fields. READ MORE

  2. 2. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Julius Andersson; David Engström; [2019]
    Keywords : Steganography; Steganalysis; Watermarking; Information hiding; Cryptography; Compression; Non-intrusive; Sturdy; JPEG; Steganografi; Steganalys; Vattenmärkning; Kryptografi; Kompression; Icke störande; Stabil; JPEG;

    Abstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE

  3. 3. Watermarking Video Game Textures

    University essay from Blekinge Tekniska Högskola/Sektionen för ingenjörsvetenskap

    Author : Pedram Khoshdani; [2013]
    Keywords : watermarking; image; texture; dds; dxt; bc;

    Abstract : How amazing would it be to prevent illegal copies of computer games? Game developers work with the hope that they can make good profit out of their games, but when they know that they would not sell much they will be so disappointed and that is because once a few original copies of their games are released, soon or late, there will be illegal copies available in the market. Working on how to distinguish between a legal copy and an illegal copy is the general topic of this thesis. READ MORE

  4. 4. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE

  5. 5. Singular Value Decomposition and Discrete Cosine Transform based Image Watermarking

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : S.M. Rafizul Haque; [2008]
    Keywords : Image Watermarking; SVD; DCT;

    Abstract : Rapid evolution of digital technology has improved the ease of access to digital information enabling reliable, faster and efficient storage, transfer and processing of digital data. It also leads to the consequence of making the illegal production and redistribution of digital media easy and undetectable. READ MORE