watermark造句91 The robustness of JND plays a key role in blind watermark detection.
92 A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.
93 It also provides rich functions about watermark string and job definition.
94 A lossless scheme of a binary image watermark based on wavelet transform is proposed.
95 The application of watermark for joint ownership can improve the security and redundancy of watermark information.
96 Firstly, the watermark sequence is encrypted by pseud - number sequence.
97 Considering robustness of watermark, we choice frequency Coefficients of DWT ( Discrete Wavelet Transformation ) to embed white watermark.
98 Experimentation shows that this watermark algorithm has good concealment and frangibility.
99 This algorithm can extract the watermark without the original carrier image and the original watermark image.
100 Brightness factor F is keywords , the simultaneous inner minor wave modulus carries out a descending sort on all son , the F minor wave modulus choosing front implants location as figure watermark.
101 From the experiment results, it indicates that, after the watermarked MPEG-4 video suffer filtering, rotation, scaling and transcoding, the watermark possesses good imperceptibility and robustness.
102 Cut - to - register: Paper with a watermark in the same position on each cut sheet.
103 Then after preprocessing the binary image watermark, with different embedding strength the watermark image is embedded by the rule of odd-even adjudgement.
104 The ownership prover insert the watermark into the host signal using symmetric watermark technology based on spread spectrum.
105 In addition, we introduce the integration of the spread spectrum technology and the digital watermark technology, so this digital technology has a strong haleness and safety.
106 The brightness level of the watermark and shadow colors are adjustable as well.
107 Experimental results show the watermark is invisible and robust to common image processing operations such as JPEG compression, cropping, resizing, median value filtering and noise perturbation.
108 Moreover, we consider the characters of HVS Human Visual System , consequently watermark has nice invisibility.
109 This watermark extracted using correlation detection, without the participation of the original carrier image to achieve the blind watermark detection.
110 Through imbedding the watermark in the high-density 2D symbol ones it while having large data memory capacity, and it satisfying the information safety.
111 The watermark can be extracted by DCT on the audio signal embedded watermark.
112 The availability of the extracted watermark ise-valuated by comparing the normalized correlation coefficient of the extracted watermark with the true one.
113 This algorithm can quickly embed the watermark to large-scale 3D meshes and is robust to various attacks. Finally we analyze some necessary conditions to construct the non-invertible scheme.
114 Watermark is extracted by comparing the line - spacing under consideration with the reference line - spacing.
115 It is based on JND model which provides the maximum amount of watermark signal that can be tolerated at every image location without affecting the visual quality of the image.
116 One algorithm frame about secure and exact image authentication based on fragile watermark is presented.
117 Use your existing Watermark Sensor with WatchDog Weather Stations and Data Loggers.
118 The first scheme: In the video domain, ICA is used to extract dynamic component and static component of the consecutive frames(Sentence dictionary), the watermark is embeded into the dynamic one.
119 This context firstly introduced the foundation, classification, research status and application areas of digital watermark in the aspects of inreversible and reversible watermark.
120 In order to improve the ability to resist the disturbance, the watermark was processed by convolutional encoding and interleaving before embedding.