Добірка наукової літератури з теми "SECURE WATERMARKING"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "SECURE WATERMARKING".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "SECURE WATERMARKING"
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Повний текст джерелаKou, Weidong. "Watermarking protocol of secure verification." Journal of Electronic Imaging 16, no. 4 (October 1, 2007): 043002. http://dx.doi.org/10.1117/1.2804233.
Повний текст джерелаLi, Xuelong. "Watermarking in secure image retrieval." Pattern Recognition Letters 24, no. 14 (October 2003): 2431–34. http://dx.doi.org/10.1016/s0167-8655(03)00072-2.
Повний текст джерелаZhang, J., W. Kou, and K. Fan. "Secure buyer–seller watermarking protocol." IEE Proceedings - Information Security 153, no. 1 (2006): 15. http://dx.doi.org/10.1049/ip-ifs:20055069.
Повний текст джерелаRosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (August 1, 2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.
Повний текст джерелаYu, Chuying, Xiaowei Li, Xinan Chen, and Jianzhong Li. "An Adaptive and Secure Holographic Image Watermarking Scheme." Entropy 21, no. 5 (May 2, 2019): 460. http://dx.doi.org/10.3390/e21050460.
Повний текст джерелаWazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview." Electronics 10, no. 14 (July 20, 2021): 1744. http://dx.doi.org/10.3390/electronics10141744.
Повний текст джерелаUmamageswari, A., and G. R. Suresh. "Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (September 1, 2015): 544. http://dx.doi.org/10.11591/tijee.v15i3.1573.
Повний текст джерелаThapa, Manjit, and Sandeep Kumar Sood. "On Secure Digital Image Watermarking Techniques." Journal of Information Security 02, no. 04 (2011): 169–84. http://dx.doi.org/10.4236/jis.2011.24017.
Повний текст джерелаCox, I. J., J. Kilian, F. T. Leighton, and T. Shamoon. "Secure spread spectrum watermarking for multimedia." IEEE Transactions on Image Processing 6, no. 12 (December 1997): 1673–87. http://dx.doi.org/10.1109/83.650120.
Повний текст джерелаДисертації з теми "SECURE WATERMARKING"
Noorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.
Повний текст джерелаSchäfer, Marcel [Verfasser], Michael [Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112332782/34.
Повний текст джерелаSchäfer, Marcel [Verfasser], Michael Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] [Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-52449.
Повний текст джерелаOkada, Mitsuo. "Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading." 京都大学 (Kyoto University), 2011. http://hdl.handle.net/2433/147349.
Повний текст джерелаAdamo, Oluwayomi Bamidele. "VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5393/.
Повний текст джерелаAl-Nu'aimi, Abdallah S. N. A. "Design, Implementation and Performance Evaluation of Robust and Secure Watermarking Techniques for Digital Coloured Images. Designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.
Повний текст джерелаAl-Nu'aimi, Abdallah Saleem Na. "Design, implementation and performance evaluation of robust and secure watermarking techniques for digital coloured images : designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.
Повний текст джерелаBellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.
Повний текст джерелаCloud computing has emerged as a successful paradigm allowing individuals and companies to store and process large amounts of data without a need to purchase and maintain their own networks and computer systems. In healthcare for example, different initiatives aim at sharing medical images and Personal Health Records (PHR) in between health professionals or hospitals with the help of the cloud. In such an environment, data security (confidentiality, integrity and traceability) is a major issue. In this context that these thesis works, it concerns in particular the securing of Content Based Image Retrieval (CBIR) techniques and machine learning (ML) which are at the heart of diagnostic decision support systems. These techniques make it possible to find similar images to an image not yet interpreted. The goal is to define approaches that can exploit secure externalized data and enable a cloud to provide a diagnostic support. Several mechanisms allow the processing of encrypted data, but most are dependent on interactions between different entities (the user, the cloud or a trusted third party) and must be combined judiciously so as to not leak information. During these three years of thesis, we initially focused on securing an outsourced CBIR system under the constraint of no interaction between the users and the service provider (cloud). In a second step, we have developed a secure machine learning approach based on multilayer perceptron (MLP), whose learning phase can be outsourced in a secure way, the challenge being to ensure the convergence of the MLP. All the data and parameters of the model are encrypted using homomorphic encryption. Because these systems need to use information from multiple sources, each of which outsources its encrypted data under its own key, we are interested in the problem of sharing encrypted data. A problem known by the "Proxy Re-Encryption" (PRE) schemes. In this context, we have proposed the first PRE scheme that allows both the sharing and the processing of encrypted data. We also worked on watermarking scheme over encrypted data in order to trace and verify the integrity of data in this shared environment. The embedded message is accessible whether or not the image is encrypted and provides several services
Almohammad, Adel. "Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4634.
Повний текст джерелаSoderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.
Повний текст джерелаTiivistelmä Langattoman tietoliikenteen maailmanlaajuista suosiota kiihdytti alun perin mahdollisuus korvata tietoliikennejärjestelmissä käytetyt kaapelit langattomilla ratkaisuilla. Ilmiö lisäsi myös tarvetta kehittää alan turvatekniikkaa monialaisen tutkimuksen pohjalta. Vaikka langattomat ratkaisut merkitsevät pienempiä asennuskustannuksia ja tarjoavat mahdollisuuksia luoda uudenlaisia palveluja, järjestelmien loppukäyttäjät edellyttävät kuitenkin niiden turvallisuuden olevan vastaavalla tasolla kuin langallisissa verkoissa. Myös teollisuuden langattomien tietoliikennejärjestelmen turvallisuus riippuu pitkälti viestintäkanavien turvallisuudesta. Väitöksen tavoitteena on kehittää uusia menetelmiä, joilla teollisuuden langattomat tietoliikennejärjestelmät voitaisiin turvata. Väitöksessä kehitetään toimenpiteitä tietoliikennejärjestelmien luottamuksellisuuteen ja koskemattomuuteen kohdistuvia hyökkäyksiä vastaan ja toteutetaan turvallisuusarviointi, joka kattaa järjestelmän protokollakerroksen sekä sähkömagneettisen ja fyysisen kerroksen. Väitöksen ensimmäisessä osassa hyödynnetään HIP–protokollaa (Host Identity Protocol) liikennevälineen sisäisen tietoliikennejärjestelmän turvallisuuden varmistamisessa. Lisäksi siinä kuvataan simulaatiot ja mittaushankkeet, joiden tavoitteena on arvioida käytetyn protokollan turvallisuusvaikutuksia esteettömän (line–of–sight, LOS) ja esteellisen (non–line–of–sight, NLOS) näköyhteyden tapauksissa. Sähkömagneettinen analyysi on tärkeä vaihe turvajärjestelmien kehitysprosessissa. Järjestelmissä käytetään yhä enemmän pieniä integroituja piirejä, mikä voi myös altistaa ne sähkömagneettisille (electromagnetic, EM) häiriöille. Väitöksessä tutkitaan lähikenttä–kaukokenttä -muunnokseen perustuvan arviointimenetelmän avulla sähkömagneettisen vuotosäteilyn tasoa. Lisäksi perehdytään testattavan laitteen (device under test, DUT) virtuaaliseen EM–liitäntään ja kuvataan, miten vastaavaa liitäntää voidaan hyödyntää palvelunestohyökkäyksissä. Väitöksessä tutkitaan myös tehokasta häirintämallia ja validoidaan teoreettisten laskelmien tulokset kokeellisesti. Lopuksi väitöksessä keskitytään tietoliikennejärjestelmän fyysisen kerroksen turvallisuuteen ja kehitetään kaksi algoritmia. Aktiivisen radiotaajuisen tunnistusmenetelmän avulla voidaan vaihtaa julkisia avaimia turvallista tietoliikenneyhteyttä muodostettaessa. Lisäksi esitellään vesileimausmenetelmään perustuva fyysisen kerroksen salausmenetelmä, WBPLSec. WBPLSec luo vastaanottimen ympärille suoja–alueen, minkä ansiosta se vaikuttaa analyysin ja tutkimustulosten perusteella olevan tehokas menetelmä toteuttaa fyysisen kerroksen suojaus
Книги з теми "SECURE WATERMARKING"
Patel, Krunal N. Robust and Secured Digital Audio Watermarking. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-53911-5.
Повний текст джерелаPatel, Krunal N. Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach. Springer International Publishing AG, 2020.
Знайти повний текст джерела(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.
Знайти повний текст джерелаЧастини книг з теми "SECURE WATERMARKING"
Kalker, Ton, and Mike Malkin. "Secure Quantization Index Modulation Watermark Detection." In Digital Watermarking, 16–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_2.
Повний текст джерелаLemma, Aweke, Stefan Katzenbeisser, Mehmet Celik, and Michiel van der Veen. "Secure Watermark Embedding Through Partial Encryption." In Digital Watermarking, 433–45. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_35.
Повний текст джерелаZhu, Yan, Dengguo Feng, and Wei Zou. "Collusion Secure Convolutional Spread Spectrum Fingerprinting." In Digital Watermarking, 67–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_6.
Повний текст джерелаDoërr, Gwenaël, and Jean-Luc Dugelay. "Secure Video Watermarking via Embedding Strength Modulation." In Digital Watermarking, 340–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_26.
Повний текст джерелаYu, Jeong Jae, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, and IL Hwan Park. "A Secure Steganographic Scheme against Statistical Analyses." In Digital Watermarking, 497–507. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_40.
Повний текст джерелаWong, Angela S. L., Matthew Sorell, and Robert Clarke. "Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements." In Digital Watermarking, 459–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_35.
Повний текст джерелаHe, HongJie, JiaShu Zhang, and Heng-Ming Tai. "A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication." In Digital Watermarking, 422–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_34.
Повний текст джерелаLiu, Zhongxuan, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, and Haila Wang. "Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption." In Digital Watermarking, 335–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92238-4_26.
Повний текст джерелаSingh, Amit Kumar, Basant Kumar, Ghanshyam Singh, and Anand Mohan. "Secure Multiple Watermarking Technique Using Neural Networks." In Medical Image Watermarking, 175–94. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57699-2_8.
Повний текст джерелаNi, Jiangqun, Rongyue Zhang, Jiwu Huang, Chuntao Wang, and Quanbo Li. "A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform." In Digital Watermarking, 446–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_36.
Повний текст джерелаТези доповідей конференцій з теми "SECURE WATERMARKING"
Raval, Mehul S., Priti P. Rege, and S. K. Parulkar. "Secure and robust watermarking technique." In TENCON 2012 - 2012 IEEE Region 10 Conference. IEEE, 2012. http://dx.doi.org/10.1109/tencon.2012.6412274.
Повний текст джерелаXie, Fuchun, Teddy Furon, and Caroline Fontaine. "Towards robust and secure watermarking." In the 12th ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1854229.1854258.
Повний текст джерелаMehra, Neelesh, and Madhu Shandilya. "Dual watermarking scheme for secure buyer-seller watermarking protocol." In Fourth International Conference on Digital Image Processing (ICDIP 2012), edited by Mohamed Othman, Sukumar Senthilkumar, and Xie Yi. SPIE, 2012. http://dx.doi.org/10.1117/12.956459.
Повний текст джерелаLoo, P. "Digital watermarking with complex wavelets." In IEE Seminar on Secure Images and Image Authentication. IEE, 2000. http://dx.doi.org/10.1049/ic:20000221.
Повний текст джерелаBas, Patrick. "Informed secure watermarking using optimal transport." In ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011. http://dx.doi.org/10.1109/icassp.2011.5946865.
Повний текст джерелаBen Ftima, Siraa, Mourad Talbi, and Tahar Ezzedine. "LWT-SVD secure image watermarking technique." In 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2017. http://dx.doi.org/10.1109/iceca.2017.8203737.
Повний текст джерелаAnh, Dao Nam, and Pham Quang Huy. "Structuring Element for Secure Reversible Watermarking." In 2020 International Conference on Multimedia Analysis and Pattern Recognition (MAPR). IEEE, 2020. http://dx.doi.org/10.1109/mapr49794.2020.9237780.
Повний текст джерелаCuomo, Antonio, Franco Frattolillo, Federica Landolfi, and Umberto Villano. "A simple and secure watermarking protocol." In 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN). IEEE, 2012. http://dx.doi.org/10.1109/cason.2012.6412403.
Повний текст джерелаHao, Yanjun, Guoqi Bao, and Huanguo Zhang. "Secure Public Digital Watermarking Detection Scheme." In 2008 Congress on Image and Signal Processing. IEEE, 2008. http://dx.doi.org/10.1109/cisp.2008.675.
Повний текст джерелаNair, Uma R., and Gajanan K. Birajdar. "A secure audio watermarking employing AES technique." In 2016 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2016. http://dx.doi.org/10.1109/inventive.2016.7830133.
Повний текст джерела