M. H. Nahibmhnahib.hashnode.dev·Sep 16, 2024How to Create Watermarks with Sharp in Node.js: A Step-by-Step GuideHave you ever wondered how websites automatically generate watermarks on uploaded images? If you're curious about how it's done, you're in the right place! In this tutorial, I will guide you on how to achieve this using Node.js and the popular image-...42 readssharp
Nicolas FränkelforApache APISIXapisix.hashnode.dev·Jul 11, 2024Dynamic watermarking with imgproxy and Apache APISIXLast week, I described how to add a dynamic watermark to your images on the JVM. I didn't find any library, so I had to develop the feature, or, more precisely, an embryo of a feature, by myself. Depending on your tech stack, you must search for an e...40 likeswatermarking
Nicolas Fränkelfrankel.hashnode.dev·Jul 4, 2024Dynamic watermarking on the JVMDisplaying images on your website makes for an interesting problem: on one side, you want to make them publicly available; on the other, you want to protect them against undue use. The age-long method to achieve it is watermarking: A digital waterma...Java 2D
unidoclibunidoclib.hashnode.dev·Aug 31, 2023Automating PDF Watermarking in Golang with UniPDFWelcome, dear readers, to an intriguing journey through automation and Golang. Today, we're focusing on Automating PDF Watermarking using UniPDF in Golang. Whether you're a newbie just dipping your toes into the Golang waters or an expert looking to ...1 like·37 readsGo Language
Sohail Pathaniamspathan.hashnode.dev·Jun 15, 2023Securing Your Documents: Exploring the Benefits and Use Cases of PDF WatermarkingEnsuring the security and authenticity of documents has become increasingly important today when information is easily shared and accessed all over the place. The million dollar question here is: “ How can someone really protect the security of a doc...ApyHubData security
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 6, 2022Time complexity analysis in image WatermarkingTime complexity of a watermarking scheme refers to the processing power required for embedding and extracting the watermark. This factor becomes very significant if the number of images is very large for protection.watermarking
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 5, 2022Phase correlation (PC) in Image WatermarkingAligning two similar images from the same scene taken from different perspectives is known as image registration. This may be due to correction of different scaling factors or rotation angles. Image registration is a basic step for a variety of compu...#Phase correlation (PC)
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 5, 2022Arnold cat map encryption in image watermarkingIn the proposed scheme, the selected scrambling method is Arnold Transform Map. Although the transform is simple in Arnold Transform Map, but it not only scrambles the pixel position by encoding the number of iterations, but it also reduces the key s...37 reads#Arnold cat map encryption
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Nov 3, 2022Image Watermarking Using Human visual system (HVS)Robustness and imperceptibility are two conflicting requirements which should be considered while designing a new image watermarking scheme. To balance these two requirements, the watermark should be embedded in the most perceptually significant comp...HVS
SAJJAD BAGHERI BABA AHMADIdigital-forensics.hashnode.dev·Oct 28, 2022Practical Applications of WatermarkingThe most usage of digital watermark is in field of protecting copyright, identifying criminals and military purposes. The digital watermark can be used in military and police organizations or in medical centers with reasonable cost. Digital waterma...29 readswatermarking