A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing th...
| Main Authors: | M. Nomani, Kabir, Tayan, Omar, Alginahi, Yasser M. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Hindawi Publishing Corporation
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/7857/ http://umpir.ump.edu.my/id/eprint/7857/1/A_Hybrid_Digital-Signature_and_Zero-Watermarking_Approach_for_Authentication_and_Protection_of_Sensitive_Electronic_Documents.pdf |
Similar Items
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019)
by: Alginahi, Hiba, et al.
Published: (2019)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)
by: Abdul Manaf, Azizah, et al.
Published: (2010)
Scheme To Watermark Digital Text Documents
by: Tinauli, Musstanser
Published: (2007)
by: Tinauli, Musstanser
Published: (2007)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
Analyzing the Crowd Evacuation Pattern of a Large Densely Populated Building
by: Alginahi, Yasser M., et al.
Published: (2018)
by: Alginahi, Yasser M., et al.
Published: (2018)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
Computational Investigation of Hydromagnetic Thermo-Solutal Nanofluid Slip Flow in a Darcian Porous Medium With Zero Mass Flux Boundary Condition Using Stretching Group Transformations
by: Uddin, Md. Jashim, et al.
Published: (2015)
by: Uddin, Md. Jashim, et al.
Published: (2015)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
Analysis of a Transportation System with Correlated Network Intersections: A Case Study for a Central Urban City With High Seasonal Fluctuation Trends
by: Tayan, Omar, et al.
Published: (2017)
by: Tayan, Omar, et al.
Published: (2017)
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Introduction
by: Kabir, M. Nomani, et al.
Published: (2019)
by: Kabir, M. Nomani, et al.
Published: (2019)
Simulation of Building Evacuation: Performance Analysis and Simplified Model
by: Alginahi, Yasser M., et al.
Published: (2016)
by: Alginahi, Yasser M., et al.
Published: (2016)
Conclusion
by: Alginahi, Yasser M., et al.
Published: (2019)
by: Alginahi, Yasser M., et al.
Published: (2019)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Digital Signature-based authentication framework in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Discrete Wavelet Transform (DWT) Based Dual Watermarking For Authentication And Copyright Protection
by: Lim, Chen Gen
Published: (2023)
by: Lim, Chen Gen
Published: (2023)
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
by: Wong, Shu Jie
Published: (2023)
by: Wong, Shu Jie
Published: (2023)
Dual watermarking based on DCT with human visual characteristics for authentication and copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Is trade in electrical and electronic products sensitive to IPR protection?: Evidence from China’s exports
by: Kabir, M., et al.
Published: (2015)
by: Kabir, M., et al.
Published: (2015)
Simulation of Oxidation Catalyst Converter for After-Treatment in Diesel Engines
by: M. Nomani, Kabir, et al.
Published: (2015)
by: M. Nomani, Kabir, et al.
Published: (2015)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A Robust Image Watermarking Technique With an Optimal DCT-Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
System and method for protecting digital documents and preventing unauthorized distribution of documents to third party
by: Wan Adnan, Wan Azizun, et al.
Published: (2013)
by: Wan Adnan, Wan Azizun, et al.
Published: (2013)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Lie Group Analysis and Numerical Solution of Magnetohydrodynamic Free Convective Slip Flow of Micropolar Fluid Over a Moving Plate With Heat Transfer
by: Uddin, M. J., et al.
Published: (2015)
by: Uddin, M. J., et al.
Published: (2015)
Modeling and Simulation of Traffic flow: A Case Study - First Ring Road in Downtown Madinah
by: M. Nomani, Kabir, et al.
Published: (2016)
by: M. Nomani, Kabir, et al.
Published: (2016)
Stegano-image as a digital signature to improve security authentication system in mobile computing
by: Mantoro, Teddy, et al.
Published: (2016)
by: Mantoro, Teddy, et al.
Published: (2016)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
Similar Items
-
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008) -
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008) -
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019) -
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019) -
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)