Journal articles on the topic 'SECURE WATERMARKING'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SECURE WATERMARKING.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Full textKou, Weidong. "Watermarking protocol of secure verification." Journal of Electronic Imaging 16, no. 4 (October 1, 2007): 043002. http://dx.doi.org/10.1117/1.2804233.
Full textLi, Xuelong. "Watermarking in secure image retrieval." Pattern Recognition Letters 24, no. 14 (October 2003): 2431–34. http://dx.doi.org/10.1016/s0167-8655(03)00072-2.
Full textZhang, J., W. Kou, and K. Fan. "Secure buyer–seller watermarking protocol." IEE Proceedings - Information Security 153, no. 1 (2006): 15. http://dx.doi.org/10.1049/ip-ifs:20055069.
Full textRosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (August 1, 2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.
Full textYu, Chuying, Xiaowei Li, Xinan Chen, and Jianzhong Li. "An Adaptive and Secure Holographic Image Watermarking Scheme." Entropy 21, no. 5 (May 2, 2019): 460. http://dx.doi.org/10.3390/e21050460.
Full textWazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview." Electronics 10, no. 14 (July 20, 2021): 1744. http://dx.doi.org/10.3390/electronics10141744.
Full textUmamageswari, A., and G. R. Suresh. "Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (September 1, 2015): 544. http://dx.doi.org/10.11591/tijee.v15i3.1573.
Full textThapa, Manjit, and Sandeep Kumar Sood. "On Secure Digital Image Watermarking Techniques." Journal of Information Security 02, no. 04 (2011): 169–84. http://dx.doi.org/10.4236/jis.2011.24017.
Full textCox, I. J., J. Kilian, F. T. Leighton, and T. Shamoon. "Secure spread spectrum watermarking for multimedia." IEEE Transactions on Image Processing 6, no. 12 (December 1997): 1673–87. http://dx.doi.org/10.1109/83.650120.
Full textNaseri, Mosayeb, Shahrokh Heidari, Masoud Baghfalaki, Negin fatahi, Reza Gheibi, Josep Batle, Ahmed Farouk, and Atefeh Habibi. "A new secure quantum watermarking scheme." Optik 139 (June 2017): 77–86. http://dx.doi.org/10.1016/j.ijleo.2017.03.091.
Full textPujara, Chirag, Ashok Bhardwaj, Vikram M. Gadre, and Sourabh Khire. "Secure Watermarking in Fractional Wavelet Domains." IETE Journal of Research 53, no. 6 (November 2007): 573–80. http://dx.doi.org/10.1080/03772063.2007.10876174.
Full textZairi, Mourad, Tarik Boujiha, and Abdelhaq Ouelli. "Secure fragile watermarking based on Huffman encoding and optimal embedding strategy." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (February 1, 2023): 1132. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp1132-1139.
Full textLi, Xiang Yang, Yang Jing Zhong, Fu Bao Liao, and Rong Li. "An Improved Watermarking Scheme for Secure Data Aggregation in WSNs." Applied Mechanics and Materials 556-562 (May 2014): 6298–301. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6298.
Full textFu, Ling Yun, De Fa Hu, Xiao Ling Wang, and Jian Li Chen. "A Secure and Efficient Buyer-Seller Watermarking Protocol." Applied Mechanics and Materials 34-35 (October 2010): 898–902. http://dx.doi.org/10.4028/www.scientific.net/amm.34-35.898.
Full textAbrar, Alsehli, Wadood Abdul, and Sanaa Ghouzali. "Secure Image Authentication Using Watermarking and Blockchain." Intelligent Automation & Soft Computing 28, no. 2 (2021): 577–91. http://dx.doi.org/10.32604/iasc.2021.016382.
Full textMeeravali, C. H. "Efficient Video Watermarking Scheme for Secure Transmission." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 28, 2017): 929–34. http://dx.doi.org/10.22214/ijraset.2017.3172.
Full textKumar, Basant, Harsh Vikram Singh, Surya Pal Singh, and Anand Mohan. "Secure Spread-Spectrum Watermarking for Telemedicine Applications." Journal of Information Security 02, no. 02 (2011): 91–98. http://dx.doi.org/10.4236/jis.2011.22009.
Full textAgrawal, Sushama, and Anjali Bhalchandra. "Firefly optimized robust, imperceptible, secure watermarking scheme." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (November 1, 2022): 1155. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp1155-1163.
Full textLi, De, JongWeon Kim, and JongUk Choi. "Secure Asymmetric Watermarking Based on Correlation Detection." KIPS Transactions:PartC 12C, no. 3 (June 1, 2005): 379–86. http://dx.doi.org/10.3745/kipstc.2005.12c.3.379.
Full textLian, Shiguo. "Secure multimedia watermarking authentication in wavelet domain." Journal of Electronic Imaging 17, no. 3 (July 1, 2008): 033010. http://dx.doi.org/10.1117/1.2954129.
Full textAlqahtani, Abdullah. "Secure and Reversible Watermarking for 3D Images." Journal of Computational and Theoretical Nanoscience 15, no. 6 (June 1, 2018): 1808–13. http://dx.doi.org/10.1166/jctn.2018.7315.
Full textShyamala, G., I. Jasmine Selvakumari Jeya, and M. Revathi. "Secure and Reliable Watermarking in Relational Databases." International Journal of Computer Trends and Technology 11, no. 1 (May 25, 2014): 13–18. http://dx.doi.org/10.14445/22312803/ijctt-v11p103.
Full textK, Swaraja. "A Hybrid Secure watermarking technique in Telemedicine." International Journal of Engineering and Technology 9, no. 3S (July 17, 2017): 265–70. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s042.
Full textLin, Yih-Kai, Cheng-Hsing Yang, and Jinn-Tsong Tsai. "More secure lossless visible watermarking by DCT." Multimedia Tools and Applications 77, no. 7 (May 5, 2017): 8579–601. http://dx.doi.org/10.1007/s11042-017-4753-3.
Full textShi, Hui, Xianghai Wang, Mingchu Li, Jun Bai, and Bin Feng. "Secure variable-capacity self-recovery watermarking scheme." Multimedia Tools and Applications 76, no. 5 (February 24, 2016): 6941–72. http://dx.doi.org/10.1007/s11042-016-3328-z.
Full textTsai, Han-Min, and Long-Wen Chang. "Secure reversible visible image watermarking with authentication." Signal Processing: Image Communication 25, no. 1 (January 2010): 10–17. http://dx.doi.org/10.1016/j.image.2009.11.002.
Full textElshazly, Ehab H., Osama S. Faragallah, Alaa M. Abbas, Mahmoud A. Ashour, El-Sayed M. El-Rabaie, Hassan Kazemian, Saleh A. Alshebeili, Fathi E. Abd El-Samie, and Hala S. El-sayed. "Robust and secure fractional wavelet image watermarking." Signal, Image and Video Processing 9, S1 (August 26, 2014): 89–98. http://dx.doi.org/10.1007/s11760-014-0684-x.
Full textRayachoti, Eswaraiah, Sudhir Tirumalasetty, and Silpa Chaitanya Prathipati. "SLT based watermarking system for secure telemedicine." Cluster Computing 23, no. 4 (March 7, 2020): 3175–84. http://dx.doi.org/10.1007/s10586-020-03078-2.
Full textQuan, Liu, Chen Zheng, and Zhou Zude. "Research on secure buyer-seller watermarking protocol." Journal of Systems Engineering and Electronics 19, no. 2 (April 2008): 370–76. http://dx.doi.org/10.1016/s1004-4132(08)60094-8.
Full textChaudhari, Sangita Santosh. "Secure Dissemination and Protection of Raster Data using Merkle Hash Tree based Cryptowatermarking." ITM Web of Conferences 32 (2020): 03049. http://dx.doi.org/10.1051/itmconf/20203203049.
Full textYe, Zhengmao, Hang Yin, and Yongmao Ye. "Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis." Applied System Innovation 1, no. 4 (October 17, 2018): 40. http://dx.doi.org/10.3390/asi1040040.
Full textTalbi, Mourad, and Med Salim Bouhlel. "Secure Image Watermarking Based on LWT and SVD." International Journal of Image and Graphics 18, no. 04 (October 2018): 1850021. http://dx.doi.org/10.1142/s0219467818500213.
Full textB, Madhu, and Ganga Holi. "An optimal and secure watermarking system using SWT-SVD and PSO." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (May 1, 2020): 917. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp917-926.
Full textBlake, Jonathan, and Shahram Latifi. "Digital Watermarking Security." Defence Science Journal 61, no. 5 (September 2, 2011): 408. http://dx.doi.org/10.14429/dsj.61.1176.
Full textGupta, Ritu, Anurag Mishra, and Sarika Jain. "Secure Image Watermarking in a Compressed SPIHT Domain Using Paillier Cryptosystem." International Journal of Information System Modeling and Design 10, no. 4 (October 2019): 51–70. http://dx.doi.org/10.4018/ijismd.2019100103.
Full textSingh, Kamred Udham, Turki Aljrees, Ankit Kumar, and Teekam Singh. "Secure NIfTI Image Authentication Scheme for Modern Healthcare System." Applied Sciences 13, no. 9 (April 24, 2023): 5308. http://dx.doi.org/10.3390/app13095308.
Full textDeng, Xiao Hong, Zhi Gang Chen, Xiao Heng Deng, and An Feng Liu. "A Study of Watermarking Application in Medical Digital Images." Applied Mechanics and Materials 195-196 (August 2012): 529–33. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.529.
Full textAhmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map." International Journal of Rough Sets and Data Analysis 5, no. 4 (October 2018): 61–73. http://dx.doi.org/10.4018/ijrsda.2018100104.
Full textDaham, Abderrahmane, and Mohamed ouslim. "Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems." International Journal of Computer Science and Information Technology 14, no. 5 (October 31, 2022): 53–74. http://dx.doi.org/10.5121/ijcsit.2022.14505.
Full textAgarwal, Namita, and Pradeep Kumar Singh. "Robust and Secure Watermarking for Propagation of Digital Multimedia by Paillier Homomorphic Cryptosystem With Arnold Transformation." International Journal of E-Health and Medical Communications 12, no. 4 (July 2021): 17–31. http://dx.doi.org/10.4018/ijehmc.20210701.oa2.
Full textNawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Anum Mehmood, Raza Ahmed, Zeeshan, and Qurat Ul Ain. "A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 11 (November 1, 2020): 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.
Full textKusanti, Jani, and Ramadhian Agus Triono Sudalyo. "Solo City Batik Design Security System (SiKemTi Solo) During the Pandemic Covid-19." SinkrOn 6, no. 1 (October 12, 2021): 113–19. http://dx.doi.org/10.33395/sinkron.v6i1.11141.
Full textFadhil Mohammed, Amal, Hayder A. Nahi, Akmam Majed Mosa, and Inas Kadhim. "Secure E-healthcare System Based on Biometric Approach." Data & Metadata 2 (July 8, 2023): 56. http://dx.doi.org/10.56294/dm202356.
Full textAparna, Puvvadi, and Polurie Venkata Vijay Kishore. "A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System." Journal of Intelligent Systems 29, no. 1 (August 27, 2019): 1558–75. http://dx.doi.org/10.1515/jisys-2018-0370.
Full textGosavi, Chhaya S., and Suresh N. Mali. "Secure, Robust Video Watermarking to Prevent Camcorder Piracy." Indian Journal of Science and Technology 10, no. 18 (May 1, 2017): 1–10. http://dx.doi.org/10.17485/ijst/2017/v10i18/111377.
Full textWANG, Fei, Hong CHEN, and Zhen-jiu XIAO. "Secure digital watermarking protocol based on buyer-seller." Journal of Computer Applications 31, no. 5 (June 17, 2011): 1288–90. http://dx.doi.org/10.3724/sp.j.1087.2011.01288.
Full textHongyuan Li, Guangjie Liu, Yuewei Dai, and Zhiquan Wang. "Secure Multimedia Distribution Based on Watermarking and Encryption." Journal of Convergence Information Technology 5, no. 9 (November 30, 2010): 279–86. http://dx.doi.org/10.4156/jcit.vol5.issue9.29.
Full textBarreto, P. S. L. M., H. Y. Kim, and V. Rijmen. "Toward secure public-key blockwise fragile authentication watermarking." IEE Proceedings - Vision, Image, and Signal Processing 149, no. 2 (2002): 57. http://dx.doi.org/10.1049/ip-vis:20020168.
Full textRial, Alfredo, Mina Deng, Tiziano Bianchi, Alessandro Piva, and Bart Preneel. "A Provably Secure Anonymous Buyer–Seller Watermarking Protocol." IEEE Transactions on Information Forensics and Security 5, no. 4 (December 2010): 920–31. http://dx.doi.org/10.1109/tifs.2010.2072830.
Full text