Localization Watermarking for Authentication of Text Images in Quran
The phenomenon of widespread usage of smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend of communicating through social networking applications and social networking sites, Muslims tend to share the image of verse from the Quran to the sit...
| Main Authors: | Syifak Izhar, Hisham, Jasni, Mohamad Zain, Afifah Nailah, Muhamad, Gran, Badshah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/5167/ http://umpir.ump.edu.my/id/eprint/5167/1/fskkp-2013-syifak-LocalizationWatermarking.pdf |
Similar Items
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
Authentication System for Medical Images Using Hilbert Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2014)
by: Syifak Izhar, Hisham, et al.
Published: (2014)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
HILBERT-LSB-C as Authentication System for Color Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2015)
by: Syifak Izhar, Hisham, et al.
Published: (2015)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Watermarking of single and multi frame ultrasound medical images
by: Gran, Badshah
Published: (2016)
by: Gran, Badshah
Published: (2016)
Comparative analysis on raster, spiral, hilbert, and peano mapping pattern of fragile watermarking to address the authentication issue in healthcare system
by: Syifak Izhar, Hisham, et al.
Published: (2019)
by: Syifak Izhar, Hisham, et al.
Published: (2019)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Using Spiral Scan Technique for Medical Image Watermarking with Tamper Detection and Recovery
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Clinical assessment of watermarked medical images
by: Mohamad Zain, Jasni, et al.
Published: (2009)
by: Mohamad Zain, Jasni, et al.
Published: (2009)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
A Review of Reversible Medical Image Watermarking Scheme with Tamper Localization and Recovery Capability
by: Khor, Hui Liang, et al.
Published: (2014)
by: Khor, Hui Liang, et al.
Published: (2014)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Hybrid particle swarm optimization for robust digital image watermarking
by: Tao, Hai, et al.
Published: (2011)
by: Tao, Hai, et al.
Published: (2011)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
Robust Image Zero- Watermarking Based on Complex Zernike Moment
by: Khalid, Edris, et al.
Published: (2014)
by: Khalid, Edris, et al.
Published: (2014)
Robust Image Zero-Watermarking Based on Complex Zernike Moment
by: Edris, Khalid, et al.
Published: (2014)
by: Edris, Khalid, et al.
Published: (2014)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
A Quick Glance at Digital Watermarking in PACS
by: Syifak Izhar, Hisham, et al.
Published: (2012)
by: Syifak Izhar, Hisham, et al.
Published: (2012)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
XML Digital Watermarking
by: Khalid, Edris, et al.
Published: (2013)
by: Khalid, Edris, et al.
Published: (2013)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
Similar Items
-
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013) -
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016) -
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015) -
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021) -
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)