A robust watermark embedding in smooth areas
Robustness is one of the most important properties of watermarking, the watermark should be readable from images that underwent common attacks such as lossy compression or Joint Photographic Experts Group (JPEG). While many publications consider the relation between smoothness and quality of the ima...
| Main Authors: | Zeki, Akram M., Abdul Manaf, Azizah, Adamu, Abubakar Ibrahim, Zamani, Mazdak |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Academic Journals Inc.
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/4204/ http://irep.iium.edu.my/4204/1/123-131.pdf |
Similar Items
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Empirical investigation of the factors influencing the usage mobile government services: case study of Saudi Arabia
by: Zamzami, Ikhlas, et al.
Published: (2016)
by: Zamzami, Ikhlas, et al.
Published: (2016)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Design and fabrication of POF/PCF based optical switch
for Local Area Network (LAN) system
by: Bhuiyan, Moinul, et al.
Published: (2014)
by: Bhuiyan, Moinul, et al.
Published: (2014)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Evaluation of university teaching hospital websites in Nigeria
by: Mahmud, Murni, et al.
Published: (2013)
by: Mahmud, Murni, et al.
Published: (2013)
Large core diameter POF/PCF optical switch using shape memory alloy (SMA) coil actuator for local area network (LAN) system
by: Bhuiyan, Moinul
Published: (2015)
by: Bhuiyan, Moinul
Published: (2015)
Visualization of job availability based on text analytics localization approach
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
by: Mohamad Zamani, Nur Azmina, et al.
Published: (2019)
Correlation between speaker gender and perceptual quality of mobile speech signal
by: Al-Othmani, Abdulaleem Z., et al.
Published: (2020)
by: Al-Othmani, Abdulaleem Z., et al.
Published: (2020)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016)
by: Mansor, Hafizah, et al.
Published: (2016)
Generalized quantum rotation gates using STIRAP
by: Issoufa, Youssouf Hamidou, et al.
Published: (2013)
by: Issoufa, Youssouf Hamidou, et al.
Published: (2013)
Nonlinear stochastic operators to control the consensus problem in multi-agent systems
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
by: Abdulghafor, Rawad Abdulkhaleq Abdulmolla, et al.
Published: (2017)
Attitude of students towards information access issues: The case of International Islamic University Malaysia
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Speaker identification based on curvlet transform technique
by: Abualadas, Feras E., et al.
Published: (2018)
by: Abualadas, Feras E., et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Similar Items
-
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011) -
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011) -
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011) -
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011) -
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)