Article | 08-April-2018
In the text, A method of image watermarking based on DCT (Discrete Cosine Transform) domain algorithm is proposed and verified in experiment by Matlab. The experimental result shows that the current method can achieve embedding with sound robustness and invisibility. From the experimental results, the quality of the watermarked image is almost no decline relative to the original.
Wu He-Jing
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 2, 38–45
Research Article | 15-February-2020
Basabi Chakraborty
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–5
Article | 01-March-2015
and invisibility of watermarking algorithm, this paper analyzes the embedding position and strategy of transform domain algorithms, the DC coefficient in the carrier image is divided into blocks of DCT spectrum and spectrum on the combination of DWT coefficient method and the advantage of embedded dual watermarking, and use the NEC characteristic of the algorithm is improved adaptive based on the embedded mode. The gray image watermark bit plane decomposition compression high four bit plane
Zhu Yuefeng,
Lin Li
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 199–219
Article | 16-December-2013
Basically, a steganography indicates two of the principal requirements such the messages and the carrier file. Besides, it should have three aspects: capacity, imperceptibility, and robustness. This paper will show how to enhance the capacity of two types of carrier files for embedding message. By using Least Significant Bit method and modifying the four last bits of carrier files, bitmap and wav files could show the increasing of message size to be inserted to the carrier than only modifying
Jasril,
Ismail Marzuki,
Faisal Rahmat
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 5, 1970–1985
Research paper | 10-April-2013
This paper proposes a method of reduced-reference image quality assessment based on watermarking algorithm in underwater acoustic channel. By embedding the watermark image into the original one, then delivering the combined image through the channel distortion, the same channel distortion would be exposed to the original and the watermark image. In the receiver,we use the blind extraction methods to recover the watermark image and use the watermark degradation to evaluate the quality of the
YUAN Fei,
YE Zheng-Shan,
LIN Cong-Ren,
CHENG En
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 2, 752–771
research-article | 31-August-2021
section.
Figure 1.
T-SNE Plot for word Embedding
II.
Literature Survey
A.
Text detection and recognition
Text in images carries a high level of information which makes this property of images very rich in computer vision as well as for humans. The information encoded in the text can be very beneficial for many computer vision applications. Text detection and recognition [7] face some challenges like the diversity of nature, the complexity of background, interference factors, etc. The first novel
Zaryab Shaker,
Xiao Feng,
Muhammad Adeel Ahmed Tahir
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 3, 42–49
Article | 01-June-2015
In this work, optical fiber refractometers based on the successive incorporation of gold nanoparticles have been fabricated by means of the Layer-by-Layer Embedding (LbL-E) deposition technique. This enables the apparition of two different optical phenomena, Localized Surface Plasmon Resonance (LSPR) and Lossy Mode Resonance (LMR). The absorption peaks related to both phenomena were captured during the fabrication process, showing a different evolution as a function of the resultant thickness
Pedro J. Rivero,
Miguel Hernaez,
Javier Goicoechea,
Ignacio R. Matías,
Francisco J. Arregui
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 822–841
Article | 24-November-2017
features, utilising time-series analysis, which can improve both the recognition of the index by the industry as well as the motivations to further research and develop methodologies to evaluate overall aviation safety performance using its quantified system properties. This paper discusses not only the features but also their embedding into the existing approach for the development of aviation safety, highlighting possible deficiencies to overcome and relating the scientific work already performed in
Andrej LALIŠ
Transport Problems, Volume 12 , ISSUE 3, 51–58
Review Paper | 09-December-2014
primarily or secondarily the thalamocortical system as it had been explored by Gloor (1979) for idiopathic generalized rpilepsy and Steriade and Amzica (2003) for different types of generalized spike and wave discharges. Conclusions and syndromological embedding of ESES. In an overwhelming majority of the investigated cases, the maps of the single discharges constituting sleep activation are identical; with focal/regional interictal spikes followed by slow closing wave, as it is seen in childhood
Peter Halász,
Márta Hegyi,
Zsuzsa Siegler,
András Fogarasi
Journal of Epileptology, Volume 22 , ISSUE 2, 71–87