Статті в журналах з теми "SECURE WATERMARKING"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "SECURE WATERMARKING".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Повний текст джерелаKou, Weidong. "Watermarking protocol of secure verification." Journal of Electronic Imaging 16, no. 4 (October 1, 2007): 043002. http://dx.doi.org/10.1117/1.2804233.
Повний текст джерелаLi, Xuelong. "Watermarking in secure image retrieval." Pattern Recognition Letters 24, no. 14 (October 2003): 2431–34. http://dx.doi.org/10.1016/s0167-8655(03)00072-2.
Повний текст джерелаZhang, J., W. Kou, and K. Fan. "Secure buyer–seller watermarking protocol." IEE Proceedings - Information Security 153, no. 1 (2006): 15. http://dx.doi.org/10.1049/ip-ifs:20055069.
Повний текст джерелаRosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (August 1, 2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.
Повний текст джерелаYu, Chuying, Xiaowei Li, Xinan Chen, and Jianzhong Li. "An Adaptive and Secure Holographic Image Watermarking Scheme." Entropy 21, no. 5 (May 2, 2019): 460. http://dx.doi.org/10.3390/e21050460.
Повний текст джерелаWazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview." Electronics 10, no. 14 (July 20, 2021): 1744. http://dx.doi.org/10.3390/electronics10141744.
Повний текст джерелаUmamageswari, A., and G. R. Suresh. "Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (September 1, 2015): 544. http://dx.doi.org/10.11591/tijee.v15i3.1573.
Повний текст джерелаThapa, Manjit, and Sandeep Kumar Sood. "On Secure Digital Image Watermarking Techniques." Journal of Information Security 02, no. 04 (2011): 169–84. http://dx.doi.org/10.4236/jis.2011.24017.
Повний текст джерелаCox, I. J., J. Kilian, F. T. Leighton, and T. Shamoon. "Secure spread spectrum watermarking for multimedia." IEEE Transactions on Image Processing 6, no. 12 (December 1997): 1673–87. http://dx.doi.org/10.1109/83.650120.
Повний текст джерелаNaseri, Mosayeb, Shahrokh Heidari, Masoud Baghfalaki, Negin fatahi, Reza Gheibi, Josep Batle, Ahmed Farouk, and Atefeh Habibi. "A new secure quantum watermarking scheme." Optik 139 (June 2017): 77–86. http://dx.doi.org/10.1016/j.ijleo.2017.03.091.
Повний текст джерелаPujara, Chirag, Ashok Bhardwaj, Vikram M. Gadre, and Sourabh Khire. "Secure Watermarking in Fractional Wavelet Domains." IETE Journal of Research 53, no. 6 (November 2007): 573–80. http://dx.doi.org/10.1080/03772063.2007.10876174.
Повний текст джерелаZairi, Mourad, Tarik Boujiha, and Abdelhaq Ouelli. "Secure fragile watermarking based on Huffman encoding and optimal embedding strategy." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (February 1, 2023): 1132. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp1132-1139.
Повний текст джерелаLi, Xiang Yang, Yang Jing Zhong, Fu Bao Liao, and Rong Li. "An Improved Watermarking Scheme for Secure Data Aggregation in WSNs." Applied Mechanics and Materials 556-562 (May 2014): 6298–301. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6298.
Повний текст джерелаFu, Ling Yun, De Fa Hu, Xiao Ling Wang, and Jian Li Chen. "A Secure and Efficient Buyer-Seller Watermarking Protocol." Applied Mechanics and Materials 34-35 (October 2010): 898–902. http://dx.doi.org/10.4028/www.scientific.net/amm.34-35.898.
Повний текст джерелаAbrar, Alsehli, Wadood Abdul, and Sanaa Ghouzali. "Secure Image Authentication Using Watermarking and Blockchain." Intelligent Automation & Soft Computing 28, no. 2 (2021): 577–91. http://dx.doi.org/10.32604/iasc.2021.016382.
Повний текст джерелаMeeravali, C. H. "Efficient Video Watermarking Scheme for Secure Transmission." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 28, 2017): 929–34. http://dx.doi.org/10.22214/ijraset.2017.3172.
Повний текст джерелаKumar, Basant, Harsh Vikram Singh, Surya Pal Singh, and Anand Mohan. "Secure Spread-Spectrum Watermarking for Telemedicine Applications." Journal of Information Security 02, no. 02 (2011): 91–98. http://dx.doi.org/10.4236/jis.2011.22009.
Повний текст джерелаAgrawal, Sushama, and Anjali Bhalchandra. "Firefly optimized robust, imperceptible, secure watermarking scheme." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (November 1, 2022): 1155. http://dx.doi.org/10.11591/ijeecs.v28.i2.pp1155-1163.
Повний текст джерелаLi, De, JongWeon Kim, and JongUk Choi. "Secure Asymmetric Watermarking Based on Correlation Detection." KIPS Transactions:PartC 12C, no. 3 (June 1, 2005): 379–86. http://dx.doi.org/10.3745/kipstc.2005.12c.3.379.
Повний текст джерелаLian, Shiguo. "Secure multimedia watermarking authentication in wavelet domain." Journal of Electronic Imaging 17, no. 3 (July 1, 2008): 033010. http://dx.doi.org/10.1117/1.2954129.
Повний текст джерелаAlqahtani, Abdullah. "Secure and Reversible Watermarking for 3D Images." Journal of Computational and Theoretical Nanoscience 15, no. 6 (June 1, 2018): 1808–13. http://dx.doi.org/10.1166/jctn.2018.7315.
Повний текст джерелаShyamala, G., I. Jasmine Selvakumari Jeya, and M. Revathi. "Secure and Reliable Watermarking in Relational Databases." International Journal of Computer Trends and Technology 11, no. 1 (May 25, 2014): 13–18. http://dx.doi.org/10.14445/22312803/ijctt-v11p103.
Повний текст джерелаK, Swaraja. "A Hybrid Secure watermarking technique in Telemedicine." International Journal of Engineering and Technology 9, no. 3S (July 17, 2017): 265–70. http://dx.doi.org/10.21817/ijet/2017/v9i3/170903s042.
Повний текст джерелаLin, Yih-Kai, Cheng-Hsing Yang, and Jinn-Tsong Tsai. "More secure lossless visible watermarking by DCT." Multimedia Tools and Applications 77, no. 7 (May 5, 2017): 8579–601. http://dx.doi.org/10.1007/s11042-017-4753-3.
Повний текст джерелаShi, Hui, Xianghai Wang, Mingchu Li, Jun Bai, and Bin Feng. "Secure variable-capacity self-recovery watermarking scheme." Multimedia Tools and Applications 76, no. 5 (February 24, 2016): 6941–72. http://dx.doi.org/10.1007/s11042-016-3328-z.
Повний текст джерелаTsai, Han-Min, and Long-Wen Chang. "Secure reversible visible image watermarking with authentication." Signal Processing: Image Communication 25, no. 1 (January 2010): 10–17. http://dx.doi.org/10.1016/j.image.2009.11.002.
Повний текст джерелаElshazly, Ehab H., Osama S. Faragallah, Alaa M. Abbas, Mahmoud A. Ashour, El-Sayed M. El-Rabaie, Hassan Kazemian, Saleh A. Alshebeili, Fathi E. Abd El-Samie, and Hala S. El-sayed. "Robust and secure fractional wavelet image watermarking." Signal, Image and Video Processing 9, S1 (August 26, 2014): 89–98. http://dx.doi.org/10.1007/s11760-014-0684-x.
Повний текст джерелаRayachoti, Eswaraiah, Sudhir Tirumalasetty, and Silpa Chaitanya Prathipati. "SLT based watermarking system for secure telemedicine." Cluster Computing 23, no. 4 (March 7, 2020): 3175–84. http://dx.doi.org/10.1007/s10586-020-03078-2.
Повний текст джерелаQuan, Liu, Chen Zheng, and Zhou Zude. "Research on secure buyer-seller watermarking protocol." Journal of Systems Engineering and Electronics 19, no. 2 (April 2008): 370–76. http://dx.doi.org/10.1016/s1004-4132(08)60094-8.
Повний текст джерелаChaudhari, Sangita Santosh. "Secure Dissemination and Protection of Raster Data using Merkle Hash Tree based Cryptowatermarking." ITM Web of Conferences 32 (2020): 03049. http://dx.doi.org/10.1051/itmconf/20203203049.
Повний текст джерелаYe, Zhengmao, Hang Yin, and Yongmao Ye. "Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis." Applied System Innovation 1, no. 4 (October 17, 2018): 40. http://dx.doi.org/10.3390/asi1040040.
Повний текст джерелаTalbi, Mourad, and Med Salim Bouhlel. "Secure Image Watermarking Based on LWT and SVD." International Journal of Image and Graphics 18, no. 04 (October 2018): 1850021. http://dx.doi.org/10.1142/s0219467818500213.
Повний текст джерелаB, Madhu, and Ganga Holi. "An optimal and secure watermarking system using SWT-SVD and PSO." Indonesian Journal of Electrical Engineering and Computer Science 18, no. 2 (May 1, 2020): 917. http://dx.doi.org/10.11591/ijeecs.v18.i2.pp917-926.
Повний текст джерелаBlake, Jonathan, and Shahram Latifi. "Digital Watermarking Security." Defence Science Journal 61, no. 5 (September 2, 2011): 408. http://dx.doi.org/10.14429/dsj.61.1176.
Повний текст джерелаGupta, Ritu, Anurag Mishra, and Sarika Jain. "Secure Image Watermarking in a Compressed SPIHT Domain Using Paillier Cryptosystem." International Journal of Information System Modeling and Design 10, no. 4 (October 2019): 51–70. http://dx.doi.org/10.4018/ijismd.2019100103.
Повний текст джерелаSingh, Kamred Udham, Turki Aljrees, Ankit Kumar, and Teekam Singh. "Secure NIfTI Image Authentication Scheme for Modern Healthcare System." Applied Sciences 13, no. 9 (April 24, 2023): 5308. http://dx.doi.org/10.3390/app13095308.
Повний текст джерелаDeng, Xiao Hong, Zhi Gang Chen, Xiao Heng Deng, and An Feng Liu. "A Study of Watermarking Application in Medical Digital Images." Applied Mechanics and Materials 195-196 (August 2012): 529–33. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.529.
Повний текст джерелаAhmad, Musheer, and Hamed D. AlSharari. "Cryptanalysis and Improvement of a Digital Watermarking Scheme Using Chaotic Map." International Journal of Rough Sets and Data Analysis 5, no. 4 (October 2018): 61–73. http://dx.doi.org/10.4018/ijrsda.2018100104.
Повний текст джерелаDaham, Abderrahmane, and Mohamed ouslim. "Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems." International Journal of Computer Science and Information Technology 14, no. 5 (October 31, 2022): 53–74. http://dx.doi.org/10.5121/ijcsit.2022.14505.
Повний текст джерелаAgarwal, Namita, and Pradeep Kumar Singh. "Robust and Secure Watermarking for Propagation of Digital Multimedia by Paillier Homomorphic Cryptosystem With Arnold Transformation." International Journal of E-Health and Medical Communications 12, no. 4 (July 2021): 17–31. http://dx.doi.org/10.4018/ijehmc.20210701.oa2.
Повний текст джерелаNawaz, Saqib Ali, Jingbing Li, Uzair Aslam Bhatti, Anum Mehmood, Raza Ahmed, Zeeshan, and Qurat Ul Ain. "A Novel Hybrid Discrete Cosine Transform Speeded Up Robust Feature-Based Secure Medical Image Watermarking Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 11 (November 1, 2020): 2588–99. http://dx.doi.org/10.1166/jmihi.2020.3220.
Повний текст джерелаKusanti, Jani, and Ramadhian Agus Triono Sudalyo. "Solo City Batik Design Security System (SiKemTi Solo) During the Pandemic Covid-19." SinkrOn 6, no. 1 (October 12, 2021): 113–19. http://dx.doi.org/10.33395/sinkron.v6i1.11141.
Повний текст джерелаFadhil Mohammed, Amal, Hayder A. Nahi, Akmam Majed Mosa, and Inas Kadhim. "Secure E-healthcare System Based on Biometric Approach." Data & Metadata 2 (July 8, 2023): 56. http://dx.doi.org/10.56294/dm202356.
Повний текст джерелаAparna, Puvvadi, and Polurie Venkata Vijay Kishore. "A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System." Journal of Intelligent Systems 29, no. 1 (August 27, 2019): 1558–75. http://dx.doi.org/10.1515/jisys-2018-0370.
Повний текст джерелаGosavi, Chhaya S., and Suresh N. Mali. "Secure, Robust Video Watermarking to Prevent Camcorder Piracy." Indian Journal of Science and Technology 10, no. 18 (May 1, 2017): 1–10. http://dx.doi.org/10.17485/ijst/2017/v10i18/111377.
Повний текст джерелаWANG, Fei, Hong CHEN, and Zhen-jiu XIAO. "Secure digital watermarking protocol based on buyer-seller." Journal of Computer Applications 31, no. 5 (June 17, 2011): 1288–90. http://dx.doi.org/10.3724/sp.j.1087.2011.01288.
Повний текст джерелаHongyuan Li, Guangjie Liu, Yuewei Dai, and Zhiquan Wang. "Secure Multimedia Distribution Based on Watermarking and Encryption." Journal of Convergence Information Technology 5, no. 9 (November 30, 2010): 279–86. http://dx.doi.org/10.4156/jcit.vol5.issue9.29.
Повний текст джерелаBarreto, P. S. L. M., H. Y. Kim, and V. Rijmen. "Toward secure public-key blockwise fragile authentication watermarking." IEE Proceedings - Vision, Image, and Signal Processing 149, no. 2 (2002): 57. http://dx.doi.org/10.1049/ip-vis:20020168.
Повний текст джерелаRial, Alfredo, Mina Deng, Tiziano Bianchi, Alessandro Piva, and Bart Preneel. "A Provably Secure Anonymous Buyer–Seller Watermarking Protocol." IEEE Transactions on Information Forensics and Security 5, no. 4 (December 2010): 920–31. http://dx.doi.org/10.1109/tifs.2010.2072830.
Повний текст джерела