XML Digital Watermarking
Due to the widespread and population of internet, digital data is copied and reproduced easily, which generate the high demand for copyright protection. Digital watermarking is one of the most efficient methods to protect the digital data. Digital watermarking is the process of hiding digital signal...
| Main Authors: | Khalid, Edris, Fakhreldin, Mohammed Adam Ibrahim, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/5046/ http://umpir.ump.edu.my/id/eprint/5046/1/32-UMP.pdf |
Similar Items
Robust Image Zero- Watermarking Based on Complex Zernike Moment
by: Khalid, Edris, et al.
Published: (2014)
by: Khalid, Edris, et al.
Published: (2014)
Robust Image Zero-Watermarking Based on Complex Zernike Moment
by: Edris, Khalid, et al.
Published: (2014)
by: Edris, Khalid, et al.
Published: (2014)
Reversible Watermarking Based on Sorting Prediction Algorithm
by: Khalid, Edris, et al.
Published: (2015)
by: Khalid, Edris, et al.
Published: (2015)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
Efficient Mapping XML DTD to Relational Database
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
Reversible Watermarking Based on Sorting Prediction Scheme
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Hybrid particle swarm optimization for robust digital image watermarking
by: Tao, Hai, et al.
Published: (2011)
by: Tao, Hai, et al.
Published: (2011)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Clinical assessment of watermarked medical images
by: Mohamad Zain, Jasni, et al.
Published: (2009)
by: Mohamad Zain, Jasni, et al.
Published: (2009)
An improved mapping pattern for digital watermarking
by: Mohamad Nazmi, Nasir
Published: (2019)
by: Mohamad Nazmi, Nasir
Published: (2019)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Employing Psychoacoustic Model for Digital Audio Watermarking
by: Chai Siew, Li
Published: (2013)
by: Chai Siew, Li
Published: (2013)
Digital Watermarking in Medical Images
by: Jasni, Mohamad Zain
Published: (2005)
by: Jasni, Mohamad Zain
Published: (2005)
Big Data: Issues, Challenges, Technologies and Methods
by: Khalid, Adam, et al.
Published: (2015)
by: Khalid, Adam, et al.
Published: (2015)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
Experiment of Tamper Detection and Recovery Watermarking in PACS
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Adoption of software development life cycle (SDLC) model in games development framework for serious games applications
by: Siti Normaziah, Ihsan, et al.
Published: (2018)
by: Siti Normaziah, Ihsan, et al.
Published: (2018)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Experiment of Tamper Detection and Recovery Watermarking in
Picture Archiving and Communication Systems
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
Review : Machine and deep learning methods in Malaysia for COVID-19
by: Mohammed Adam Kunna, Azrag, et al.
Published: (2023)
by: Mohammed Adam Kunna, Azrag, et al.
Published: (2023)
Pathfinding algorithms in game development
by: Rafiq, Abdul, et al.
Published: (2020)
by: Rafiq, Abdul, et al.
Published: (2020)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
A serious games development framework through application of software development life cycle model
by: Siti Normaziah, Ihsan, et al.
Published: (2017)
by: Siti Normaziah, Ihsan, et al.
Published: (2017)
Consistency check between XML schema and class diagram for document versioning
by: Ibrahim, Rosziati, et al.
Published: (2018)
by: Ibrahim, Rosziati, et al.
Published: (2018)
Storing and query XML document using relation database
by: Siti Hajar, Sulaiman
Published: (2015)
by: Siti Hajar, Sulaiman
Published: (2015)
Halal Barcode Scanner Prototype in Android using Client Side Processing with Json Technology
by: Noor Munirah, Marzuki, et al.
Published: (2014)
by: Noor Munirah, Marzuki, et al.
Published: (2014)
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
by: M. Nomani, Kabir, et al.
Published: (2014)
by: M. Nomani, Kabir, et al.
Published: (2014)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Similar Items
-
Robust Image Zero- Watermarking Based on Complex Zernike Moment
by: Khalid, Edris, et al.
Published: (2014) -
Robust Image Zero-Watermarking Based on Complex Zernike Moment
by: Edris, Khalid, et al.
Published: (2014) -
Reversible Watermarking Based on Sorting Prediction Algorithm
by: Khalid, Edris, et al.
Published: (2015) -
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012) -
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)