Robust and secure watermarking scheme based on singular values replacement (SVD & DWT)
☆57Sep 16, 2014Updated 11 years ago
Alternatives and similar repositories for wateramarking
Users that are interested in wateramarking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An approach to a blind discrete Wavelet Transformation (DWT) domain feature point based image watermarking technique is proposed in this …☆19Dec 23, 2014Updated 11 years ago
- This is a project for watermarking using DWT and SVD。☆19May 30, 2018Updated 7 years ago
- Demo of Digital Watermarking in images☆10Jun 29, 2018Updated 7 years ago
- Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC☆111Mar 11, 2024Updated 2 years ago
- Cryptanalysis of an image scrambling encryption algorithm (ISEA).☆10Sep 19, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- a simple spread-spectrum based informed watermarking implementation in MATLAB☆29Mar 15, 2017Updated 9 years ago
- image Encryption☆12Apr 25, 2017Updated 8 years ago
- This project is done as part of the course "Image Processing". In this project we implemented an Image Compression and Encryption algorit…☆18Jan 15, 2019Updated 7 years ago
- Blind video watermarking with great invisibility and robustness.☆104Aug 11, 2022Updated 3 years ago
- Implement some trivial digital watermark and test its robustness☆17Apr 12, 2019Updated 7 years ago
- A collection of audio watermarking algorithm implementations for my MATH408 (Intro to Cryptography) research paper.☆22Sep 28, 2011Updated 14 years ago
- Implementation of 2 chaotic map encryption schemes in MATLAB.☆28Oct 9, 2020Updated 5 years ago
- 2D fractal Haar wavelet transform for lossy image compression or robust steganography/watermarking☆22Nov 6, 2019Updated 6 years ago
- A Robust Blind Watermarking Using Convolutional Neural Network☆22Dec 10, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 五子棋人机博弈,极大极小值,剪枝,启发式搜索☆10Nov 7, 2020Updated 5 years ago
- Affine scale-invariant feature transform implementation in Matlab.☆11Mar 13, 2018Updated 8 years ago
- A selection of resources from Binghamton University's EECE580G - Deep Learning for ECE course☆12May 21, 2021Updated 4 years ago
- This repository contains the source codes of a novel variant of the Grey Wolf Optimization (GWO) algorithm, named Velocity-Aided Grey Wol…☆12Mar 18, 2022Updated 4 years ago
- WxHere is a zero effort weather application that gives the user the weather at their current location as well as a seven day forecast☆27Jun 16, 2014Updated 11 years ago
- Image Encryption Algorithm implementation using AES and Visual Cryptography☆12Aug 20, 2020Updated 5 years ago
- Simple-ish script which starts an equaliser under pipewire and connects a real output device to it as well as a virtual device to relay a…☆11Nov 21, 2025Updated 4 months ago
- This is a C++ implementation of cocoapi bbox evaluation code.☆11Dec 9, 2021Updated 4 years ago
- The JPEG toolbox for Python☆16Mar 31, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Double-Niched Evolutionary Algorithm (DNEA) for Multi-Modal Multi-Objective Optimization (PPSN 2018 & CEC 2019)☆10Mar 26, 2021Updated 5 years ago
- Code for "JPEG-resistant Adversarial Images"☆43Apr 25, 2018Updated 7 years ago
- Code from my research papers☆12May 12, 2022Updated 3 years ago
- Reduced on-disk Suffix Array☆22Oct 9, 2013Updated 12 years ago
- Matlab implementation of FuCoLoT tracker☆18Jan 17, 2019Updated 7 years ago
- A persistent queue implemented in Go.☆29Dec 31, 2021Updated 4 years ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Aug 12, 2015Updated 10 years ago
- ☆12Jan 8, 2016Updated 10 years ago
- implement of entropy method in matlab, 用matlab实现熵权法☆10Jan 29, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- MATLAB code for BACF object tracker☆16Jan 20, 2019Updated 7 years ago
- PRA-TPE: Perfectly recoverable approximate thumbnail-preserving image encryption☆11Mar 24, 2022Updated 4 years ago
- Here you find the implementation of the method described in our SIBGRAPI 2019 paper "Hierarchy-of-Visual-Words: a Learning-based Approach…☆10Mar 1, 2022Updated 4 years ago
- A collection of minimal examples for the sparta plug-ins.☆13Jul 12, 2025Updated 9 months ago
- Database of Artificial Intelligence and Robotics papers.☆12Jul 11, 2016Updated 9 years ago
- mp3 steganography library☆22Apr 11, 2025Updated last year
- Generate QR codes in UNIX way☆12Aug 5, 2019Updated 6 years ago