• No results found

[PDF] Top 20 A Survey on data conceal and protection in digital image

Has 10000 "A Survey on data conceal and protection in digital image" found on our website. Below are the top 20 most common "A Survey on data conceal and protection in digital image".

A Survey on data conceal and protection in digital image

A Survey on data conceal and protection in digital image

... [15] D. C. Wu and W. H. Tsai proposed an efficient steganography method for embedding message into gray color image. Cover image is partitioned into blocks of two consecutive pixel and blocks is not ... See full document

5

A Survey of Enhanced Digital Image Data Hiding Using Block Histogram Shifting

A Survey of Enhanced Digital Image Data Hiding Using Block Histogram Shifting

... gray image is divided into the 4*4 blocks further this is divided into 2*2 ...secret data is\ embedded into the other ...encrypted image authentication, content owner identification and privacy ... See full document

5

A SURVEY OF DIGITAL IMAGE WATERMARKING TECHNIQUES

A SURVEY OF DIGITAL IMAGE WATERMARKING TECHNIQUES

... multimedia data is very crucial for the internet based technology as there are several problems associated with the multimedia ...of digital watermarking is playing a vital role for securing the multimedia ... See full document

7

Geographical Techniques Used For Digital Image Map Building

Geographical Techniques Used For Digital Image Map Building

... input data for hybrid systems vary in a large field (see figure ...of data are expected, like: satellite image data, digital orthophotos, image data from airborne scanner ... See full document

5

A Survey on Various Techniques used to Add Watermark to Multimedia Data for Digital Copyrights Protection

A Survey on Various Techniques used to Add Watermark to Multimedia Data for Digital Copyrights Protection

... of digital contents a strong technique may be ...right protection as described by the author for digital data is provided by Digital ...original image also called as cover ... See full document

6

Digital image in image watermarking for copyright protection and 
		authentication

Digital image in image watermarking for copyright protection and authentication

... are made to ignore or continue to be insensitive to manipulations. Conversely, in medical, forensic, and intelligence or military applications where content integrity and source authentication are a significant matter, ... See full document

24

DIGITAL IMAGE WATERMARKING TECHNIQUES: A SURVEY

DIGITAL IMAGE WATERMARKING TECHNIQUES: A SURVEY

... multimedia data such as audio images and videos to the ...technology, digital data can be easily plagiarized, modified or deleted without proper authentication and ...scenario protection of ... See full document

6

A Robust Digital Image Watermarking for Biometric Template Protection Applications

A Robust Digital Image Watermarking for Biometric Template Protection Applications

... information. Digital image processing is a technique that uses computer algorithms to perform image processing on digital ...of digital image processing has been fuelled by ... See full document

6

Data Protection and Privacy for Alternative Data

Data Protection and Privacy for Alternative Data

... of data available through digital technology, and which now can constitute “alternative data” for credit granting, financial risk assessment, collection and business development ...of data ... See full document

36

DFT BASED DIGITAL IMAGE WATERMARKING: A SURVEY

DFT BASED DIGITAL IMAGE WATERMARKING: A SURVEY

... of digital network gave rise to the exchange of digital information which can be easily manipulated, copy or shared over a digital ...the digital data in the form of audio, video or an ... See full document

5

A Visual Cryptography Based Digital Image Copyright Protection

A Visual Cryptography Based Digital Image Copyright Protection

... the digital images to be modified, distributed, duplicated and accessed ...for digital data ...an image, audio, video or other digital media element to provide privacy protect- tion ... See full document

9

Robust Digital Image Watermarking Scheme for Copyright Protection

Robust Digital Image Watermarking Scheme for Copyright Protection

... their data or ...multimedia data such as images over the internet quite ...consent. Digital watermarks have been proposed as a way to tackle this tough issue ... See full document

6

Digital Literacy: A Survey Level Digital Literacy Competence among University Students in Jakarta

Digital Literacy: A Survey Level Digital Literacy Competence among University Students in Jakarta

... on data fro m the Indonesian Generasi Milenian Profile book published by the Ministry of Wo men's Empowe rment and Ch ild Protection with the Centra l Bureau of Statistics in 2018, the age of research ... See full document

8

A Survey on the Image Denoising to enhance Medical Images

A Survey on the Image Denoising to enhance Medical Images

... the image like brightness and colour information and is usually electronic in ...while image acquisition and the quality of the imaging sensor elements affect their performance resulting in degraded ... See full document

7

Topological Structure in Digital Image Processing : A Survey

Topological Structure in Digital Image Processing : A Survey

... 1935 digital topology related work call ``grid cell topology" was proposed by ...dimensions digital space by means of cellular ...an image with the adjacency ...for digital curves if the ... See full document

5

A Survey on Data Protection in Cloud Storage

A Survey on Data Protection in Cloud Storage

... B-Associate degree Enterprise designs To begin Mega corps and accomplice Corp, the client gets an accreditation from certification generator. These qualifications might speak to data about the client, Mega Corp ... See full document

8

Survey on Image Fog Reduction Techniques

Survey on Image Fog Reduction Techniques

... restore image as well as find a reliable transmission map for additional applications such as image refocusing and neon ...model, image is broken down into segments of constant ... See full document

5

Survey on Personal Data Protection in the IoT

Survey on Personal Data Protection in the IoT

... sensor data and use them to provide services to their users; in addition most of them require data from other applications in order to enhance their ...However, data sharing increases the risk for ... See full document

5

A digital data logger for seawaves: a survey

A digital data logger for seawaves: a survey

... It was decided that as the logger purchased would form the heart of the EOG data gathering system for the next six to eight years, a great deal of consideration shoiild be given to the s[r] ... See full document

10

A Survey on Different Image Processing Techniques for
Pest Identification and Plant Disease Detection

A Survey on Different Image Processing Techniques for Pest Identification and Plant Disease Detection

... diverse image processing techniques and artificial neural network. The image is filtered and segmented using Gabor ...of image is done by ANN ... See full document

5

Show all 10000 documents...