1、the high [low] watermark

2、Shaded watermark: watermark with opaque rather than tranaparent appearance.

3、orientation [watermark images on banknotes]

4、Digital audio watermark system based on LabVIEW

5、I decided to cut the watermark below.

6、The Sent Items folder low watermark value must be smaller than the high watermark value.

7、When extracting the watermark, determine the extracting location in accordance with the key, extract the binary watermark and then recover the gray image watermark.

8、Based on the HVS watermark image of fuzzy control algorithm

9、The watermark on the banknote is to prevent forgery.

10、Text zero-watermark based on use frequency of Chinese characters

11、Proposes a new lossy robust spread spectrum watermark algorithm.

12、The zero-watermark method is a new digital watermarking method.

13、You see a picture in his website do not have watermark, watermark appeared on the website that reprints his.

14、Firstly, it can be obtained 2-value watermark image by PDF417 coding to watermark information and chaotic sequence scrambling.

15、In carries on the analysis to the robust digital watermark elementary theory in the foundation, effectively improved in the TURBO codes numeral watermark technology the robust performance.

16、Watermark is iteratively embedded into each local region centered at the points. HVS is used for the invisibility of the watermark.

17、Digital watermark is wrapup marks in the way of signal processing in digitized hyperactive data imbedded.

18、Based on chaos theory, the gray image as watermark is encrypted.

19、The watermark component runs in kernel mode and can be loaded and upgraded dynamically.

20、Compared with DCT-based system, DWT-base watermark system is an adaptive system.

21、It is lossless watermark embedding, a detailed experimental has reference to the value of a great!

22、For a watermark, the highest or lowest value reached, up to the end of the most recent 15-minute interval.

23、The experimental results show that not only does this algorithm make the watermark invisible, but the imbeded watermark also has the strong robust upon the geometry distortion in the spa.

24、In this paper a novel radix encoding scheme based on dynamic binary-tree is presented, and the constants existed in the watermark is encoded to tamper-proof the watermark itself.

25、Dynamic graph watermark (DGW) is one of the best dynamic software watermarks. The idea of DGW is encoding the watermark into topology graph in order to be immune to semantics preserving attack.

26、Because the watermark is embedded redundantly in the whole band of the model, the approach is robust against various attacks.

27、The watermark can be retrieved by using either optical or digital Fourier transform on halftone images containing the watermarked information.

28、Watermark detection is implemented by comparing the new difference of mean values of watermarked image blocks with the threshold values.

29、In order to enhancing the security of the watermark, we employ an encryption technology based on chaos and bit plan.

30、From the experiment results, it indicates that, after the watermarked MPEG-4 video suffer filtering, rotation, scaling and transcoding, the watermark possesses good imperceptibility and robustness.