unidoclibunidoclib.hashnode.dev·Aug 31, 2023Automating PDF Watermarking in Golang with UniPDFWelcome, dear readers, to an intriguing journey through automation and Golang. Today, we're focusing on Automating PDF Watermarking using UniPDF in Golang. Whether you're a newbie just dipping your toes into the Golang waters or an expert looking to ...Discuss·1 like·43 readsGo Language
Sohail Pathaniamspathan.hashnode.dev·Jun 15, 2023Securing Your Documents: Exploring the Benefits and Use Cases of PDF WatermarkingEnsuring the security and authenticity of documents has become increasingly important today when information is easily shared and accessed all over the place. The million dollar question here is: “ How can someone really protect the security of a doc...DiscussApyHubData security
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 6, 2022Time complexity analysis in image WatermarkingTime complexity of a watermarking scheme refers to the processing power required for embedding and extracting the watermark. This factor becomes very significant if the number of images is very large for protection.Discuss·43 readswatermarking
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 5, 2022Phase correlation (PC) in Image WatermarkingAligning two similar images from the same scene taken from different perspectives is known as image registration. This may be due to correction of different scaling factors or rotation angles. Image registration is a basic step for a variety of compu...Discuss#Phase correlation (PC)
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 5, 2022Arnold cat map encryption in image watermarkingIn the proposed scheme, the selected scrambling method is Arnold Transform Map. Although the transform is simple in Arnold Transform Map, but it not only scrambles the pixel position by encoding the number of iterations, but it also reduces the key s...Discuss·37 reads#Arnold cat map encryption
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 3, 2022Image Watermarking Using Human visual system (HVS)Robustness and imperceptibility are two conflicting requirements which should be considered while designing a new image watermarking scheme. To balance these two requirements, the watermark should be embedded in the most perceptually significant comp...DiscussHVS
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Oct 28, 2022Practical Applications of WatermarkingThe most usage of digital watermark is in field of protecting copyright, identifying criminals and military purposes. The digital watermark can be used in military and police organizations or in medical centers with reasonable cost. Digital waterma...Discuss·67 readswatermarking
Qichao Yingqichaoying.hashnode.dev·Jul 16, 2022[DeepMIH Review] Recursive INN and Importance MapArticle Guan, Zhenyu, Junpeng Jing, Xin Deng, Mai Xu, Lai Jiang, Zhou Zhang, and Yipeng Li. "DeepMIH: Deep Invertible Network for Multiple Image Hiding." IEEE Transactions on Pattern Analysis and Machine Intelligence (2022). Method The motivation of ...Discuss·134 readsDeep Learning