ISB watermarking embedding: block based model
Many watermarking methods have been developed with different methodological complexity levels. Each of these methods tries to reduce exposure in different attack. In this study, the ISB watermarking method was implemented based on average of block of pixels together in order to improve the watermark...
| Main Authors: | Zeki, Akram M., Abdul Manaf, Azizah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Network for Scientific Information
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/4207/ http://irep.iium.edu.my/4207/1/23030-23030.pdf |
Similar Items
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
A robust watermark embedding in smooth areas
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Analysis of ISB watermarking model : block based methods vs Embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
WSN based sensing model for smart crowed movement with identification: an extended study
by: Nawaz, Naeem A., et al.
Published: (2017)
by: Nawaz, Naeem A., et al.
Published: (2017)
Prediction-based resource allocation model for real time tasks
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016)
by: Mansor, Hafizah, et al.
Published: (2016)
Analysis of ISB watermarking model: block based methods vs embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Modulational Instability in Salerno Model
by: Banseghir, A., et al.
Published: (2010)
by: Banseghir, A., et al.
Published: (2010)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan
by: Rind, M Malook, et al.
Published: (2016)
by: Rind, M Malook, et al.
Published: (2016)
Performance analysis of clustering based genetic
algorithm
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
by: Najeeb, Athaur Rahman, et al.
Published: (2016)
Correlation between speaker gender and perceptual quality of mobile speech signal
by: Al-Othmani, Abdulaleem Z., et al.
Published: (2020)
by: Al-Othmani, Abdulaleem Z., et al.
Published: (2020)
Development of virtual assembly layout with modeling languages approach and simulation using Delmia™ Quest®
by: M., Norhidayah, et al.
Published: (2011)
by: M., Norhidayah, et al.
Published: (2011)
Similar Items
-
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011) -
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011) -
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011) -
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012) -
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)