Attacking visible watermark in video / Ahmed Alsayed Zaki Embaby ; Supervised Khaled Mostafa Elsayed , Mohamed Ahmed Wahby
Material type:
- مهاجمة العلامة المائية المرئية فى الفيديو [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.Ph.D.2020.Ah.A (Browse shelf(Opens below)) | Not for loan | 01010110082349000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.Ph.D.2020.Ah.A (Browse shelf(Opens below)) | 82349.CD | Not for loan | 01020110082349000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.20.01.Ph.D.2017.Ka.E An Efficient routing scheme for large-scale wireless sensor networks / | Cai01.20.01.Ph.D.2017.Ta.P A proposed model for dynamic QoS in real time applications / | Cai01.20.01.Ph.D.2017.Ta.P A proposed model for dynamic QoS in real time applications / | Cai01.20.01.Ph.D.2020.Ah.A Attacking visible watermark in video / | Cai01.20.01.Ph.D.2020.Ah.A Attacking visible watermark in video / | Cai01.20.01.Ph.D.2020.Di.D Development of spectrum sharing protocol for cognitive radio internet of things / | Cai01.20.01.Ph.D.2020.Di.D Development of spectrum sharing protocol for cognitive radio internet of things / |
Thesis (Ph.D.) - Cairo University - Faculty of Computers and Artificial Intelligence - Department of Information Technology
Over the past recent years, digital watermarking technology has seen much use and has been viewed as a potential and effective method of ending illegal access to digital multimedia products. Visual watermarking programs enables the protection of digital videos and images, which are produced based on specific demands, like contents intended for digital library or materials for distant learning websites. These contents prohibit unlawful reproduction or copying of the material. Visible watermark mechanism defends IPR (Intellectual Property Rights) persuasively; openly, watermarked data mainly contains discoverable but un-destroyable copyright keys showing the identity of IPR owners. Many commercial TV stations use video logos, which is a form of visible watermark indicating a disclaimer of content ownership. The video logos also act as a symbol of authentication to re-stream the videos when the primary logos are used together with the new logos .A regretful side effect of these logos is the constant reduction in viewing joy. Until there can be complete removal of the watermark patterns without the destruction of the video quality of the protected content, people cannot directly use visible watermarked information. Meanwhile, abundant studies are discussing the security of invisible watermarks, but there are microscopic researches on the significance of visible watermark technology Our research objective is divided into two sub-problems. The first sub-problem is to locate the visible watermark on video frames with high accuracy in order to be removed. and the second sub-problem is to consider the watermarked area/s as a damaged area/s to be reconstructed exploiting spatial and temporal information
Issued also as CD
There are no comments on this title.