Improving computational complexity using I-zag for text image authentication scheme
With the global proliferation of information and communication technologies, digital documents are increasingly used across various sectors like education, military, medical, business, and more. While the ease of access today brings convenience, it also enables easier data manipulation. Thus, authen...
| Main Author: | ‘Aqilah, Abd. Ghani |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/44083/ http://umpir.ump.edu.my/id/eprint/44083/1/Improving%20computational%20complexity%20using%20I-zag%20for%20text%20image%20authentication%20scheme.pdf |
Similar Items
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
A hybrid screen size independent authentication scheme for smart devices
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
by: Ahmad Faizuwan, Welhendri, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Steganography: Text File Hiding in Image
by: Yaw Choon, Kit
Published: (2013)
by: Yaw Choon, Kit
Published: (2013)
Fragile watermarking scheme based on SHA-256 hash function and mersenne twister for medical image authentication
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
by: Noor Aqilah, Abdul Halim, et al.
Published: (2020)
Text and image: a new hybrid authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
An Improved RDWT-based Image Steganography Scheme with QR Decomposition and Double Entropy
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Cryptanalysis of Yang-Wang-Chang’s password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
An improved legibility guideline for text in web pages
by: Ahmad Affendi, Hashim
Published: (2015)
by: Ahmad Affendi, Hashim
Published: (2015)
A novel and efficient bilateral remote user authentication
scheme using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Modified anfis architecture with less computational complexities for classification problems
by: Talpur, Noureen
Published: (2018)
by: Talpur, Noureen
Published: (2018)
Robust Image Zero- Watermarking Based on Complex Zernike Moment
by: Khalid, Edris, et al.
Published: (2014)
by: Khalid, Edris, et al.
Published: (2014)
Robust Image Zero-Watermarking Based on Complex Zernike Moment
by: Edris, Khalid, et al.
Published: (2014)
by: Edris, Khalid, et al.
Published: (2014)
Speech to text with emoji
by: Tong, Kah Pau
Published: (2023)
by: Tong, Kah Pau
Published: (2023)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Improving Web Color using Color Scheme Assessment Tool (COSAT)
by: Nurul Wahidah, Mohd Zin, et al.
Published: (2015)
by: Nurul Wahidah, Mohd Zin, et al.
Published: (2015)
Hybrid biometric authentication for automatic teller machine
by: Arokiasamy, Steven R., et al.
Published: (2024)
by: Arokiasamy, Steven R., et al.
Published: (2024)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Text Zoning Based Information Extraction Framework For Recruitment Related Text
by: Tan, Hung Chye
Published: (2006)
by: Tan, Hung Chye
Published: (2006)
Text segmentation for analysing different languages
by: Pak, Irina *, et al.
Published: (2016)
by: Pak, Irina *, et al.
Published: (2016)
A survey of arabic text mining
by: Salloum, Said A., et al.
Published: (2017)
by: Salloum, Said A., et al.
Published: (2017)
Enhancement of a simple user authentication scheme for grid computing
by: Ramamoorthy, Viknesh
Published: (2008)
by: Ramamoorthy, Viknesh
Published: (2008)
ASP authentication using IP address / Kumar Mallanaidu
by: Kumar , Mallanaidu
Published: (2003)
by: Kumar , Mallanaidu
Published: (2003)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Text to Image Generation Using Machine Learning
by: Rishab, Tiwari, et al.
Published: (2024)
by: Rishab, Tiwari, et al.
Published: (2024)
Text-based emotion prediction system using machine learning approach
by: Ahmad Fakhri, Ab. Nasir, et al.
Published: (2020)
by: Ahmad Fakhri, Ab. Nasir, et al.
Published: (2020)
Similar Items
-
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021) -
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013) -
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016) -
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008) -
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)