54   Artículos

 
en línea
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman    
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Can Li, Hua Sun, Changhong Wang, Sheng Chen, Xi Liu, Yi Zhang, Na Ren and Deyu Tong    
In order to safeguard image copyrights, zero-watermarking technology extracts robust features and generates watermarks without altering the original image. Traditional zero-watermarking methods rely on handcrafted feature descriptors to enhance their per... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng    
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Qianwen Zhou, Changqing Zhu and Na Ren    
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mingyang Zhang, Jian Dong, Na Ren and Shuitao Guo    
With the increasing demand for high-precision and difficult-to-obtain geospatial point cloud data copyright protection in military, scientific research, and other fields, research on lossless watermarking is receiving more and more attention. However, mo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Bimo Sunarfri Hantono, Syukron Abu Ishaq Alfarozi, Azkario Rizky Pratama, Ahmad Ataka Awwalur Rizqi, I Wayan Mustika, Mardhani Riasetiawan and Anna Maria Sri Asih    
Counterfeit products have become a pervasive problem in the global marketplace, necessitating effective strategies to protect both consumers and brands. This study examines the role of cybersecurity in addressing counterfeiting issues, specifically focus... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Lijun Zu, Hongyi Li, Liang Zhang, Zhihui Lu, Jiawei Ye, Xiaoxia Zhao and Shijing Hu    
With the growing demand for data sharing file formats in financial applications driven by open banking, the use of the OFD (open fixed-layout document) format has become widespread. However, ensuring data security, traceability, and accountability poses ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano    
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chengyi Qu, Xu Xi, Jinglong Du and Tong Wu    
Traditional frequency-domain watermarking algorithms for vector geographic data suffer from disadvantages such as the random watermark embedding position, unpredictable embedding strength, and difficulty in resisting multiple attacks at the same time. To... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Fahmi Amhar, Endang Purnama Giri, Florence Elfriede Sinthauli Silalahi, Shelvie Nidya Neyman, Anggrahito, Dadan Ramdani, Danang Jaya, Dewayany Sutrisno, Sandi Adhitya Kolopaking, Tia Rizka Nuzula Rachma and Murdaningsih    
This research aims to protect Digital Elevation Model (DEM) data from piracy or counterfeiting. An invisible watermark inserted into the data, which will not considerably change the data value, is necessary. The proposed method involves the use of the tw... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »