Watermarking techniques for mobile application: A review
This paper reviewed mobile applications schemes for image watermarking techniques used to secure user media files. Due to the increase in number of smartphones and Internet usage especially in today’s life, cybercrime rate seems to be increasing too. Thus, an efficient and suitable watermarking sche...
| Main Authors: | 'Aqilah, Abd. Ghani, Syifak, Izhar Hisham, Nur Alya Afikah, Usop, Nor Bakiah, Abd Warif |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
Springer
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38640/ http://umpir.ump.edu.my/id/eprint/38640/1/Watermarking%20techniques%20for%20mobile%20application_abst.pdf |
Similar Items
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)
by: Syifak Izhar, Hisham, et al.
Published: (2019)
Multiple watermarking technique using optimal threshold
by: Noruhida, Alias, et al.
Published: (2020)
by: Noruhida, Alias, et al.
Published: (2020)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
An intermediate significant bit (ISB) watermarking technique using neural networks
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Fingerprint image watermarking in spatial, frequency and multiresolution domain: techniques and challenges
by: Lebcir, Mohamed, et al.
Published: (2018)
by: Lebcir, Mohamed, et al.
Published: (2018)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Performance comparison between AODV and DSR In Mobile Ad-Hoc Network (MANET)
by: Nor Ika Shahirah, Ramli, et al.
Published: (2021)
by: Nor Ika Shahirah, Ramli, et al.
Published: (2021)
Clinical assessment of watermarked medical images
by: Mohamad Zain, Jasni, et al.
Published: (2009)
by: Mohamad Zain, Jasni, et al.
Published: (2009)
Intelligent autism screening using fuzzy agent
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
XML Digital Watermarking
by: Khalid, Edris, et al.
Published: (2013)
by: Khalid, Edris, et al.
Published: (2013)
The usage of watermarking to store patient information and diagnosis in medical images
by: Razlinda , Abd Razak
Published: (2011)
by: Razlinda , Abd Razak
Published: (2011)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
A Quick Glance at Digital Watermarking in PACS
by: Syifak Izhar, Hisham, et al.
Published: (2012)
by: Syifak Izhar, Hisham, et al.
Published: (2012)
Geofence alerts application with GPS tracking for children monitoring (CTS)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
by: Nur Alya Afikah, Usop
Published: (2024)
by: Nur Alya Afikah, Usop
Published: (2024)
An improved mapping pattern for digital watermarking
by: Mohamad Nazmi, Nasir
Published: (2019)
by: Mohamad Nazmi, Nasir
Published: (2019)
Facial image protection based on watermarking technique
by: Kiung, Siew Lian, et al.
Published: (2021)
by: Kiung, Siew Lian, et al.
Published: (2021)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
Employing Psychoacoustic Model for Digital Audio Watermarking
by: Chai Siew, Li
Published: (2013)
by: Chai Siew, Li
Published: (2013)
Reversible Watermarking Based on Sorting Prediction Algorithm
by: Khalid, Edris, et al.
Published: (2015)
by: Khalid, Edris, et al.
Published: (2015)
Cryptanalaysia Of SVD & DWT Based Watermarking Schemes
by: Ting, Chai-Wen
Published: (2007)
by: Ting, Chai-Wen
Published: (2007)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Similar Items
-
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021) -
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022) -
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021) -
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013) -
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)