Visual watermark malware11/9/2023 ![]() ![]() You do not need to download and install anything on your computer. Antennas Propagat., 24 (1976), 253–255.“Add Text to a Photo” is a free online application. Spalla, Analysis and correction of errors in a polarimeter for Faraday rotation measurements, IEEE Transact. ![]() Fu, An Approach to Fast Eye Location and Face Plane Rotation Correction, J. Banerjee, Image Denoising Using the Higher Order Singular Value Decomposition, IEEE Transact. Zhao, Efficient Nonnegative Tucker Decompositions: Algorithms and Uniqueness, IEEE Transact. Li, A fused CP factorization method for incomplete tensors, IEEE Transact. Susstrunk, Higher Order SVD Analysis for Dynamic Texture Synthesis, IEEE Transact. Upadhyay, A novel image fusion technique for gray scale images using tensor unfolding in transform domains, Recent Advances & Innovations in Engineering, India, 2014. Leung, Decoding low density parity check codes with finite quantization bits, Commu. Yu, A Color Image Watermarking Based on Tensor Analysis, IEEE Access, 6 (2018), 51500–51514. Bhattacharya, MPEG Video Watermarking Using Tensor Singular Value Decomposition, Image Analysis & Recognition, Canada, 2007. Fu, Tensor Decomposition for Signal Processing and Machine Learning, IEEE Transact. Jermyn, Efficient tree decomposition of high-rank tensors, J. ![]() Cichocki, CANDECOMP/PARAFAC decomposition of high-order tensors through tensor reshaping, IEEE Transact. Wu, Human action recognition based on tensor shape descriptor, IET Computer Vision, 10 (2016), 905–911.Ī. Shen, Discriminative tracking using tensor pooling, IEEE Transact. Sun, Sparse tensor discriminant color space for face verification, IEEE Transact. Chandra, Digital image watermarking using singular value decomposition, Symposium on Circuits & Systems, USA, 2002. Miller, A Review of watermarking and the importance of perceptual modeling, Human Vision Electron. Wang, A robust digital image watermarking algorithm based on dct domain for copyright protection, Int. Zhao, Adaptive watermarking and tree structure based image quality estimation, IEEE Transact. Zhao, An adaptive grayscale watermarking method in spatial domain, J. Lee, Digital cinema watermarking for estimating the position of the pirate, IEEE Transact. Berberidis, Efficient spatial image watermarking via new perceptual masking and blind detection schemes, IEEE Transact. Girod, Watermarking of uncompressed and compressed video, Elsevier North-Holland, 66 (1998), 283–301. Haitsma, Video watermarking system for broadcast monitoring, Secur. Tewfik, Digital Watermarking, IEEE Signal Processing Magazine, 17 (2000), 17–18. A video watermark algorithm based on tensor decomposition. The experiments show that our algorithm based on tensor decomposition has better imperceptibility and robustness against common video attacks.Ĭitation: Shanqing Zhang, Xiaoyun Guo, Xianghua Xu, Li Li, Chin-Chen Chang. Finally, the watermark is uniformly distributed across frames of a video by inverse tensor decomposition. Then, the watermark is embedded by quantifying the maximum value in the core tensor. Second, the watermark embedding position is selected based on the stability of the maximum value in the core tensor because the core tensor represents the main energy of a video. First, a grayscale video is represented as a 3-order tensor, and the core tensor is obtained by tensor decomposition. In order to improve the robustness, we take into consideration the correlation and redundancy among the frames of a video to propose a blind video watermark algorithm based on tensor decomposition. Such algorithms are weak in protecting against frame attacks. Since most of the previous video watermark algorithms regard a video as a series of consecutive images, the embedding and extraction of watermark are performed on these images, and the correlation and redundancy among frames of a video are not considered. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |