Improving the robustness of ISB watermarking techniques by repetition of the embedding
Digital watermarking is a direct embedding of additional information into the original content or host image, this study is overcome the problems existing in the classic LSB method by adapting the method to intermediate significant bits (ISB), which improve the robustness and maintain the quality of...
| Main Authors: | Zeki, Akram M., Abdul Manaf, Azizah, Mahmod, Shayma S. |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer-Verlag Berlin Heidelberg
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/4210/ http://irep.iium.edu.my/4210/1/01790592.pdf |
Similar Items
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A robust watermark embedding in smooth areas
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Analysis of ISB watermarking model : block based methods vs Embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Analysis of ISB watermarking model: Block based methods vs embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Analysis of ISB watermarking model: block based methods vs embedding repetition methods
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Variable size of blocks for embedding watermark images using ISB technique
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
An overview and proposal for analysis of the effectiveness of human factors in Dubai e-banking system
by: Abdulghafor, Rawad, et al.
Published: (2017)
by: Abdulghafor, Rawad, et al.
Published: (2017)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Similarities and dissimilarities between character frequencies of written text of Melayu, English and Indonesian languages
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
Statistical techniques to serve quality of software
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Speaker identification based on curvlet transform technique
by: Abualadas, Feras E., et al.
Published: (2018)
by: Abualadas, Feras E., et al.
Published: (2018)
3D imaging techniques in documentation of cultural assets in Malaysia
by: Md. Sharif, Harlina, et al.
Published: (2015)
by: Md. Sharif, Harlina, et al.
Published: (2015)
Plans for planar: phase-noise reduction techniques in voltage-controlled oscillators
by: Azam, S. M. Kayser, et al.
Published: (2019)
by: Azam, S. M. Kayser, et al.
Published: (2019)
Using biometric techniques to secure online student assessment: Comparative study
by: Ibrahim, Jamaludin, et al.
Published: (2011)
by: Ibrahim, Jamaludin, et al.
Published: (2011)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
Application service delivery in the modern virtualized data center-improving reliability and scalability
by: Raza, A, et al.
Published: (2016)
by: Raza, A, et al.
Published: (2016)
A comprehensive analysis of improving the QoS of IMM traffic for high speed wireless campus network
by: Yalli, Jameel Shehu, et al.
Published: (2014)
by: Yalli, Jameel Shehu, et al.
Published: (2014)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection
by: Becir, A, et al.
Published: (2010)
by: Becir, A, et al.
Published: (2010)
Improving the quality of user experience by deploying an open access network framework in a Fiber-To-The Home environment in Malaysia
by: Ismail, Zahid, et al.
Published: (2011)
by: Ismail, Zahid, et al.
Published: (2011)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Similar Items
-
ISB watermarking embedding: block based model
by: Zeki, Akram M., et al.
Published: (2011) -
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011) -
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011) -
A robust watermark embedding in smooth areas
by: Zeki, Akram M., et al.
Published: (2011) -
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)