Watermark blending technique for securing user authentication data in mobile application systems
Watermark is traditionally used for protecting copyrighted materials such as scripts, movies, images or sounds. Nowadays, the watermark is still widely used but more in a digitized environment. There are many ways of how the watermarks are being applied. In this paper, the watermark is not applied f...
| Main Authors: | Mohamed, Kartini, Sidi, Fatimah, A. Jabar, Marzanah, Ishak, Iskandar |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Database Technologies and Applications Research Group (DbTA), Faculty of Computer Science and Information Technology, Universiti Putra Malaysia
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/75527/ http://psasir.upm.edu.my/id/eprint/75527/1/ISICTMA2019-15.pdf |
Similar Items
Protecting wireless data transmission in mobile application systems using digital watermarking technique
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
Enhancing the strength of user's authentication using multifactor approach for use in mobile application system
by: Mohamed, Kartini, et al.
Published: (2015)
by: Mohamed, Kartini, et al.
Published: (2015)
A novel watermarking technique in data transmission between QR codes and database
by: Mohamed, Kartini, et al.
Published: (2013)
by: Mohamed, Kartini, et al.
Published: (2013)
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016)
by: Mohamed, Kartini, et al.
Published: (2016)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
HEVC watermarking techniques for authentication and copyright applications: challenges and opportunities
by: Ali A., Elrowayati, et al.
Published: (2020)
by: Ali A., Elrowayati, et al.
Published: (2020)
Measuring computer security awareness on internet banking and shopping for internet users
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
A review of current trend on data management and quality in data communication
by: Sidi, Fatimah, et al.
Published: (2013)
by: Sidi, Fatimah, et al.
Published: (2013)
A cloud-based distributed platform for secured EPUB EBOOK contents
by: Faniband, Yunus Parvej, et al.
Published: (2020)
by: Faniband, Yunus Parvej, et al.
Published: (2020)
Data quality dimension in data warehouse
by: Sidi, Fatimah, et al.
Published: (2011)
by: Sidi, Fatimah, et al.
Published: (2011)
Big data trend: knowledge discovery on the unstructured data
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
An approach to secure EPUB ebook content
by: Faniband, Yunus Parvej, et al.
Published: (2019)
by: Faniband, Yunus Parvej, et al.
Published: (2019)
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)
by: Abdul Manaf, Azizah, et al.
Published: (2010)
Integration of mobile and web application : an implementation of diabetic management system
by: A. Jabar, Marzanah, et al.
Published: (2013)
by: A. Jabar, Marzanah, et al.
Published: (2013)
Review on user authentication on mobile devices
by: Abdul Gimba, Usman, et al.
Published: (2024)
by: Abdul Gimba, Usman, et al.
Published: (2024)
Graphical user authentication algorithm for mobile banking user
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
by: Ugochukwu, Ejike Ekeke Kingsley, et al.
Published: (2018)
Knowledge discovery in unstructured, big data
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
by: Abu Muntalib, Shamsiah, et al.
Published: (2014)
Towards improving data quality using ontology application approach
by: Mohd Jaya, Mohd Izham, et al.
Published: (2015)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2015)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
User awareness in the authenticity of mobile Quran apps
by: Talib, Shuhaili, et al.
Published: (2016)
by: Talib, Shuhaili, et al.
Published: (2016)
A web-based interrogative ontology retrieval application for unstructured documents
by: Sidi, Fatimah, et al.
Published: (2015)
by: Sidi, Fatimah, et al.
Published: (2015)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
A watermarking authentication system for medical images
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
Object recognizer for organizing and structuring unstructured documents using Interrogative Knowledge
by: Ishak, Iskandar, et al.
Published: (2016)
by: Ishak, Iskandar, et al.
Published: (2016)
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Systematic review of data quality research
by: Jaya, M. Izham, et al.
Published: (2019)
by: Jaya, M. Izham, et al.
Published: (2019)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Offline Handwritten Signature Watermark for Digital Document Authentication
by: Low, Cheng Yaw
Published: (2008)
by: Low, Cheng Yaw
Published: (2008)
Offline Handwritten Signature Watermark For Digital Document Authentication
by: Yaw, Low Cheng
Published: (2008)
by: Yaw, Low Cheng
Published: (2008)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
A user control framework for cloud data migration in software as a service
by: Injuwe, Danga Imbaji, et al.
Published: (2024)
by: Injuwe, Danga Imbaji, et al.
Published: (2024)
A review of data quality research in achieving high data quality within organization
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
by: Mohd Jaya, Mohd Izham, et al.
Published: (2017)
Similar Items
-
Protecting wireless data transmission in mobile application systems using digital watermarking technique
by: Mohamed, Kartini, et al.
Published: (2016) -
Enhancing the strength of user's authentication using multifactor approach for use in mobile application system
by: Mohamed, Kartini, et al.
Published: (2015) -
A novel watermarking technique in data transmission between QR codes and database
by: Mohamed, Kartini, et al.
Published: (2013) -
Strengthening user authentication for better protection of mobile application systems
by: Mohamed, Kartini, et al.
Published: (2016) -
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)