A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
In this paper, we present a new zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. Most existing fragile watermarking schemes introduce errors or permanent distortion into the original database content. These distortions violat...
| Main Authors: | Alfagi, Abdalrahman, Abd. Manaf, Azizah, Hamida, Belal Ahmed, Olanrewaju, Rashidah Funke |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Islamabad : Little Lion Scientific
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/41221/ http://irep.iium.edu.my/41221/7/41221_a%20zero_distortion%20fragile%20watermarking.pdf |
Similar Items
Survey on relational database watermarking techniques
by: Alfagi, abdalrahman, et al.
Published: (2016)
by: Alfagi, abdalrahman, et al.
Published: (2016)
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017)
by: Alfagi, Abdalrahman, et al.
Published: (2017)
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015)
by: Khalifa, Othman Omran, et al.
Published: (2015)
Fragile Image Watermarking For Medical Images
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Strategic profiling for behaviour visualization of malicious node in MANETs using game theory
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
Fragile and robust dual image watermarking based on DWT-SVD
by: Ernawan, Ferda, et al.
Published: (2024)
by: Ernawan, Ferda, et al.
Published: (2024)
Fragile watermarking for image authentication using dyadic walsh ordering
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
Semi-fragile digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Modeling malicious multi-attacker node collusion
in MANETs via game theory
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
Digital watermarking: A counterfeiting and piracy deterrence
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
Computational intelligence: It’s application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)
by: Afrig, Aminuddin, et al.
Published: (2024)
An Improved Wavelet Digital Watermarking
Software Implementation
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Robust image watermarking scheme by discrete wavelet transform
by: Abdullatif, Mohammad, et al.
Published: (2014)
by: Abdullatif, Mohammad, et al.
Published: (2014)
A new fragile digital watermarking technique for a PDF digital Holy Quran
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Watermarking in protecting and validating the integrity of digital information: a case study of the holy scripture
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Computational intelligence: application in digital watermarking
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Malicious website detection
by: Ong, Vienna Lee
Published: (2019)
by: Ong, Vienna Lee
Published: (2019)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Qualitative analysis on watermarking algorithm for large resolution camera phone image
by: Saquib, Nazmus, et al.
Published: (2014)
by: Saquib, Nazmus, et al.
Published: (2014)
Image quality assessment of fast fourier transform domain watermarked images
by: Olanrewaju, Rashidah Funke, et al.
Published: (2009)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2009)
An evaluation of transform domain watermarking and its application to intellectual properties images
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Robust Image Zero- Watermarking Based on Complex Zernike Moment
by: Khalid, Edris, et al.
Published: (2014)
by: Khalid, Edris, et al.
Published: (2014)
Robust Image Zero-Watermarking Based on Complex Zernike Moment
by: Edris, Khalid, et al.
Published: (2014)
by: Edris, Khalid, et al.
Published: (2014)
State-of-the-art application of artificial neural networks in digital watermarking and the way forward
by: Olanrewaju, Rashidah Funke, et al.
Published: (2009)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2009)
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
by: Amrullah, Agit, et al.
Published: (2025)
by: Amrullah, Agit, et al.
Published: (2025)
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
A survey on current malicious javascript behavior of infected web content in detection of malicious web pages
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2020)
Similar Items
-
Survey on relational database watermarking techniques
by: Alfagi, abdalrahman, et al.
Published: (2016) -
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017) -
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015) -
Fragile Image Watermarking For Medical Images
by: Jasni, Mohamad Zain, et al.
Published: (2006) -
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)