SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Oct 28, 2022Practical Applications of WatermarkingThe most usage of digital watermark is in field of protecting copyright, identifying criminals and military purposes. The digital watermark can be used in military and police organizations or in medical centers with reasonable cost. Digital waterma...Discuss·32 readswatermarking
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Nov 5, 2022Arnold cat map encryption in image watermarkingIn the proposed scheme, the selected scrambling method is Arnold Transform Map. Although the transform is simple in Arnold Transform Map, but it not only scrambles the pixel position by encoding the number of iterations, but it also reduces the key s...Discuss·27 reads#Arnold cat map encryption
Qichao YingforDeep Learning Ideasqichaoying.hashnode.net·Jul 16, 2022[DeepMIH Review] Recursive INN and Importance MapArticle Guan, Zhenyu, Junpeng Jing, Xin Deng, Mai Xu, Lai Jiang, Zhou Zhang, and Yipeng Li. "DeepMIH: Deep Invertible Network for Multiple Image Hiding." IEEE Transactions on Pattern Analysis and Machine Intelligence (2022). Method The motivation of ...Discuss·85 readsDeep Learning
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Nov 6, 2022Time complexity analysis in image WatermarkingTime complexity of a watermarking scheme refers to the processing power required for embedding and extracting the watermark. This factor becomes very significant if the number of images is very large for protection.Discusswatermarking
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Nov 5, 2022Phase correlation (PC) in Image WatermarkingAligning two similar images from the same scene taken from different perspectives is known as image registration. This may be due to correction of different scaling factors or rotation angles. Image registration is a basic step for a variety of compu...Discuss·27 reads#Phase correlation (PC)
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Nov 5, 2022Arnold cat map encryption in image watermarkingIn the proposed scheme, the selected scrambling method is Arnold Transform Map. Although the transform is simple in Arnold Transform Map, but it not only scrambles the pixel position by encoding the number of iterations, but it also reduces the key s...Discuss·27 reads#Arnold cat map encryption
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Nov 3, 2022Image Watermarking Using Human visual system (HVS)Robustness and imperceptibility are two conflicting requirements which should be considered while designing a new image watermarking scheme. To balance these two requirements, the watermark should be embedded in the most perceptually significant comp...Discuss·33 readsHVS
SAJJAD BAGHERI BABA AHMADIfordigital-forensics.hashnode.net·Oct 28, 2022Practical Applications of WatermarkingThe most usage of digital watermark is in field of protecting copyright, identifying criminals and military purposes. The digital watermark can be used in military and police organizations or in medical centers with reasonable cost. Digital waterma...Discuss·32 readswatermarking
Qichao YingforDeep Learning Ideasqichaoying.hashnode.net·Jul 16, 2022[DeepMIH Review] Recursive INN and Importance MapArticle Guan, Zhenyu, Junpeng Jing, Xin Deng, Mai Xu, Lai Jiang, Zhou Zhang, and Yipeng Li. "DeepMIH: Deep Invertible Network for Multiple Image Hiding." IEEE Transactions on Pattern Analysis and Machine Intelligence (2022). Method The motivation of ...Discuss·85 readsDeep Learning