Essays about: "Watermarking"

Showing result 6 - 10 of 10 essays containing the word Watermarking.

  1. 6. Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques

    University essay from Högskolan Dalarna/Datateknik

    Author : Bhupathi Rajan Guruswamy Aarumugam; [2011]
    Keywords : Image watermarking; LSB; Vigenere Square; AI Techniques; Computer Vision; Steganography and Cryptography;

    Abstract : The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. READ MORE

  2. 7. Singular Value Decomposition and Discrete Cosine Transform based Image Watermarking

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : S.M. Rafizul Haque; [2008]
    Keywords : Image Watermarking; SVD; DCT;

    Abstract : Rapid evolution of digital technology has improved the ease of access to digital information enabling reliable, faster and efficient storage, transfer and processing of digital data. It also leads to the consequence of making the illegal production and redistribution of digital media easy and undetectable. READ MORE

  3. 8. Modulation for interference avoidance on the AWGN channel

    University essay from KTH/Kommunikationsteori

    Author : Jinfeng Du; [2006]
    Keywords : Costa precoding; dirty paper coding; interference avoidance; Tomlinson-Harashima precoding;

    Abstract : Theoretic results have shown that the capacity of a channel does not decrease if the receiver observes the transmitted signal in the presence of interference, provided that the transmitter knows this interference non-causally. That is, if the transmitter has non-causal access to the interference, by using proper precoding this interference could be “avoided” (as if it were not present) under the same transmit power constraint. READ MORE

  4. 9. Multimedia Security in P2P Networks

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Sudhir Ganti; [2006]
    Keywords : Peer-to-Peer; Copyright Infringement;

    Abstract : This Master thesis is a contribution to develope Multimedia security mechanisms for various P2P file sharing environments. Objective of this research thesis is to design a software tool for Multimedia business environments to fight against the copyright infringement in various P2P file sharing networks. READ MORE

  5. 10. Implementation of a Watermarking Algorithm for H.264 Video Sequences

    University essay from Institutionen för systemteknik

    Author : David Bergkvist; [2004]
    Keywords : Technology; watermark; fingerprinting; image coding; TEKNIKVETENSKAP;

    Abstract : In today's video delivery and broadcast networks, issues of copyright protection have become more urgent than in analog times, since the copying of digital video does not result in the decrease in quality that occurs when analog video is copied. One method of copyright protection is to embed a digital code, a"watermark", into the video sequence. READ MORE