High watermarking capacity based on spatial domain technique
Watermarking capacity refers to the amount of information we are able to insert into the image. Low signal to noise ratio is a phenomenon of watermarking channels, which severely limits the capacity. The aim of this study is to develop a digital watermarking model, which can find out the possibility...
| Main Authors: | Zeki, Akram M., Abdul Manaf, Azizah, Mahmod, Shayma S. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/4182/ http://irep.iium.edu.my/4182/4/High_Watennarking_Capacity_Based_on_Spatial_Domain_Technique.pdf |
Similar Items
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Analysis of ISB watermarking model: Block based methods vs embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
A robust watermark embedding in smooth areas
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
A spatial analysis on GIS-Hedonic pricing model on the influence of public open space and house price in Klang Valley, Malaysia
by: Asmawi, M. Zainora, et al.
Published: (2016)
by: Asmawi, M. Zainora, et al.
Published: (2016)
Statistical techniques to serve quality of software
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Speaker identification based on curvlet transform technique
by: Abualadas, Feras E., et al.
Published: (2018)
by: Abualadas, Feras E., et al.
Published: (2018)
3D imaging techniques in documentation of cultural assets in Malaysia
by: Md. Sharif, Harlina, et al.
Published: (2015)
by: Md. Sharif, Harlina, et al.
Published: (2015)
Plans for planar: phase-noise reduction techniques in voltage-controlled oscillators
by: Azam, S. M. Kayser, et al.
Published: (2019)
by: Azam, S. M. Kayser, et al.
Published: (2019)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
Highly efficient short length Bismuth-based erbium-doped fiber amplifier
by: Cheng, X.S., et al.
Published: (2011)
by: Cheng, X.S., et al.
Published: (2011)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
A comprehensive analysis of improving the QoS of IMM traffic for high speed wireless campus network
by: Yalli, Jameel Shehu, et al.
Published: (2014)
by: Yalli, Jameel Shehu, et al.
Published: (2014)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Similar Items
-
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011) -
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011) -
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011) -
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012) -
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)