Sciweavers

4029 search results - page 14 / 806
» Experience with Software Watermarking
Sort
View
MM
2000
ACM
112views Multimedia» more  MM 2000»
14 years 2 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
IWDW
2009
Springer
14 years 4 months ago
Local Patch Blind Spectral Watermarking Method for 3D Graphics
In this paper, we propose a blind watermarking algorithm for 3D meshes. The proposed algorithm embeds spectral domain constraints in segmented patches. After aligning the 3D object...
Ming Luo, Kai Wang, Adrian G. Bors, Guillaume Lavo...
ICMCS
2006
IEEE
107views Multimedia» more  ICMCS 2006»
14 years 3 months ago
On the Detection of Multiplicative Watermarks for Speech Signals in the Wavelet and DCT Domains
Blind multiplicative watermarking schemes for speech signals using wavelets and discrete cosine transform are presented. Watermarked signals are modeled using a generalized Gaussi...
Ramin Eslami, John Deller, Hayder Radha
INFORMATICALT
2008
93views more  INFORMATICALT 2008»
13 years 9 months ago
Robust Watermarking based on Subsampling and Nonnegative Matrix Factorization
Abstract. This paper presents a novel robust digital image watermarking scheme using subsampling and nonnegative matrix factorization. Firstly, subsampling is used to construct a s...
Wei Lu, Hongtao Lu