watermark造句61 Utilizing the human visual texture masking and luminance masking models, watermark is embedded into the largest coefficient of third level detail subimage.
62 Watermark Layout is in the attachment file for both type paper.
63 Firstly, a watermark was embedded in low band of DWT domain according to the conceal quality of human visual system (HVS).
64 The algorithm employs the baker transformation to encrypt binary watermark, simple and timesaving in implementation.
65 Designed three mentally densest key, uses to define the watermark and the position that it imbed.
66 Chaos map and singular value decomposition of matrix technology are introduced to improve the watermarking imperceptibility, security and robustness of watermark image.
67 The scheme meets properly the requirement of invisibleness and robustness for watermark.
68 In this scheme, zero reference watermark is defined based on quantization function.
69 He used original colour compositions which evoke Slavonic popular art and which are similar to precious watermark works.
70 The watermark detection algorithm based on the central limit theorem can test watermarking information accurately.
71 Audio watermarking that modulates DC level shift according to watermark has wonderful low pass and noise resistance performance.
72 The digital watermark technology is one kind of effective digital product copyright protection and the data security maintenance technology which appears in the recent ten years.
73 Then we embed watermark through modifying the motion vector type flag.
74 Finally, making use of autocorrelation function characteristic of spread spectrum sequence, watermark information was detected. In the detection process, it is not requisite for initial carrier image.
75 A method of marking an article with a watermark that diffracts radiation according to Bragg's law is disclosed.
76 Based on the similarity of watermark system and communication transform system model, there is an image watermarking method proposed here which adopts convolutional encoding technique.
77 Experiments demonstrate that the new detector can improve the performance of watermark correlation detector greatly.
78 This arithmetic can detect the digital watermark without the original carrier image and the original watermark.
79 Because of the limitation of their characteristic, video watermark technique has less hiding capacity , they can't meet the need of large data secret communication or information intercept controller.
80 An algorithm for embedding color watermark image in color carrier image was realized.
81 Reseatch result shows that watermark detection error is mainly influenced by the watermark mean energy and watermarking capacity. The detection error rises with the increase of watermarking capacity.
82 The watermark can be used to encoded information to detect illegal misuses.
83 Simple operation, the technical and professional effectiveness, which is " easily watermark. "
84 This scheme took account of two kinds of desynchronization attacks: translation and scaling. Watermark was embedded by RDM and detected by the framework of joint synchronization and decoding.
85 By utilizing error correction code, the robustness of robust watermark is improved.
86 Watermark become a new copyright protection method, the research of this aspect is more and more.
87 The embedding process is firstly JPEG decoding on carrier image, then selects the bit plane to replace the watermark according to the key.
88 The accuracy of watermark extraction depends on the key and the statistical independence between the original images and watermark.
89 Hardware monitoring module's screenshot watermark image is now stored into.
90 Considering the requirement of watermarks robustness and imperception, we present a method which can definite the intensity of the image embedded by digital watermark by the content of image.