94 resultados para Watermark
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n
Resumo:
Resumen tomado de la publicaci??n
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Ciência da Informação - FFC
Resumo:
Pós-graduação em Engenharia Elétrica - FEIS
Resumo:
Il progetto di tesi si pone come obiettivo la riqualificazione urbana del fronte mare della città di Rimini e la progettazione di un nuovo centro culturale polifunzionale. La costruzione di nuovi margini urbani, viene qui proposta secondo una reinterpretazione di un carattere tipicamente funzionale delle città di costa del litorale adriatico: la proiezione della funzione urbana oltre la linea di costa, con la costruzione di moli oltre l’edificato. “La città allunga la mano nell’acqua.” La tesi riprende questo aspetto di tipicità e propone una serie di “nuovi moli”, strutture polifunzionali destinate a incentivare quale risorsa fruitiva per il pubblico, stanziale o turistico, il rapporto col mare Adriatico. Anche in relazione a queste “proiezioni” oltre il litorale marino la tesi ha analizzato le forme dell’architettura di ultima generazione, cercando di recepirne i significati espressi attraverso la definizione formale; da qui parte il percorso della formulazione compositiva espressa nelle tavole grafiche, nelle quali si sottolinea il rapporto funzionale in relazione alla nova forma urbis e alla ricaduta sul nuovo assetto ambientale. E’, in sintesi, l’accettabilità di questo e dell’integrazione paesaggistica che la tesi vuole sostenere, attraverso il lungo percorso analitico e progettuale affrontato.
Resumo:
[Carl Oestreich]
Resumo:
Objetivo. Describir los cambios en la temperatura de la piel (Tp) durante el ejercicio registrado por medio de termografía infrarroja. Método. Se realizó una revisión sistemática de la literatura utilizando los términos ejercicio y termografía en las bases de datos de MEDLINE/PubMed, IEEEXplore y SciELO teniendo como principales factores de in- clusión, estudios con humanos sin ningún tipo de problema físico o metabólico. Resultados. Tras el proceso de exclusión, fueron seleccionados ocho artículos. La Tp tiende a disminuir al inicio del ejercicio, de manera que su magnitud depende de la duración e intensidad de la actividad pro- puesta. En ejercicios con carga progresiva se observa una continua reducción de la Tp en comparación con los valores de reposo. Sin embargo, en ejercicios prolongados, la Tp puede variar según la región corporal evaluada con reducción, mantenimiento o incluso un aumento térmico, como sucede en las principales re- giones musculares involucradas en el ejercicio. La Tp presenta respuestas específicas durante el ejercicio en función de la región corporal y la necesidad de pérdida de calor. Conclusión. La Tp disminuye en la fase inicial del ejercicio. La manera de realizar el ejercicio de perfil máxi- mo o submáximo determina la respuesta de la Tp. No existe una respuesta homogénea en la Tp entre las diferentes regiones corporales, demostrando así la extremada complejidad del proceso de control de la temperatura central. Consecuentemente, la termografía infrarroja puede ser un valioso instrumento para hacer un seguimiento tanto de la respuesta térmica local como de la general.
Resumo:
Discusión sobre los efectos del Tai Chi Chuan sobre la osteoartrosis de rodilla
Resumo:
The objective of this paper is to develop a method to hide information inside a binary image. An algorithm to embed data in scanned text or figures is proposed, based on the detection of suitable pixels, which verify some conditions in order to be not detected. In broad terms, the algorithm locates those pixels placed at the contours of the figures or in those areas where some scattering of the two colors can be found. The hidden information is independent from the values of the pixels where this information is embedded. Notice that, depending on the sequence of bits to be hidden, around half of the used pixels to keep bits of data will not be modified. The other basic characteristic of the proposed scheme is that it is necessary to take into consideration the bits that are modified, in order to perform the recovering process of the information, which consists on recovering the sequence of bits placed in the proper positions. An application to banking sector is proposed for hidding some information in signatures.
Resumo:
This article presents a complete codicological description of Manchester, Chetham's Library, MS 8009 (Mun.A.6.31), a late fifteenth-century production that contains a combination of secular and religious texts. The manuscript's significance for both the literary and textual scholar was recognized by Derek Pearsall when he suggested its suitability for a facsimile edition. The restrictions imposed by the Governors of the Library for reproduction under the present conditions, however, suggest that Pearsall's recommendation may have to wait for some time. The purpose of this paper is to fill that void by correcting some inaccuracies in previous descriptions and completing them with supporting visual evidence.