A dual-watermarking with DR code against cropping and resizing attack
Watermarking is a pattern of bits inserted into a digital image, audio or video file (digital file) that identifies the file's ownership copyright information. It is one of the techniques to discourage illegal duplication of intellectual property. However, there is still a room for improvement...
| Main Author: | Lau, Wei Khang |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/9953/ http://eprints.uthm.edu.my/9953/2/24p%20LAU%20WEI%20KHANG.pdf http://eprints.uthm.edu.my/9953/1/LAU%20WEI%20KHANG%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/9953/3/LAU%20WEI%20KHANG%20WATERMARK.pdf |
Similar Items
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Dual image watermarking based on NSST-LWT-DCT for color image
by: Avivah, Siti Nur, et al.
Published: (2024)
by: Avivah, Siti Nur, et al.
Published: (2024)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Robust blind watermarking approach against the compression for fingerprint image using 2D-DCT
by: Lebcir, Mohamed, et al.
Published: (2022)
by: Lebcir, Mohamed, et al.
Published: (2022)
Robust Watermarking Scheme Using Chinese Remainder Theorem-Based Error Correcting Codes
by: Goh, Vik Tor
Published: (2005)
by: Goh, Vik Tor
Published: (2005)
XML Digital Watermarking
by: Khalid, Edris, et al.
Published: (2013)
by: Khalid, Edris, et al.
Published: (2013)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Clinical assessment of watermarked medical images
by: Mohamad Zain, Jasni, et al.
Published: (2009)
by: Mohamad Zain, Jasni, et al.
Published: (2009)
An improved mapping pattern for digital watermarking
by: Mohamad Nazmi, Nasir
Published: (2019)
by: Mohamad Nazmi, Nasir
Published: (2019)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Employing Psychoacoustic Model for Digital Audio Watermarking
by: Chai Siew, Li
Published: (2013)
by: Chai Siew, Li
Published: (2013)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Reversible Watermarking Based on Sorting Prediction Algorithm
by: Khalid, Edris, et al.
Published: (2015)
by: Khalid, Edris, et al.
Published: (2015)
Multiple watermarking technique using optimal threshold
by: Noruhida, Alias, et al.
Published: (2020)
by: Noruhida, Alias, et al.
Published: (2020)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Performance Evaluation Of RDWT-SVD and DWT-SVD Watermarking Schemes
by: Rassem, Taha H., et al.
Published: (2016)
by: Rassem, Taha H., et al.
Published: (2016)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Development of Al-Mu’awwidhah computing for personal data
protection against abnormal attacks
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
by: Shamsudin, Ahmad Faizul, et al.
Published: (2013)
Smart Attendance System Using QR Code
by: Yong, Wei Lun
Published: (2019)
by: Yong, Wei Lun
Published: (2019)
Robust Image Zero- Watermarking Based on Complex Zernike Moment
by: Khalid, Edris, et al.
Published: (2014)
by: Khalid, Edris, et al.
Published: (2014)
Spread Spectrum Audio Watermarking Using Vector Space Projections
by: Adamu I., Abu Bakar, et al.
Published: (2015)
by: Adamu I., Abu Bakar, et al.
Published: (2015)
Robust Image Zero-Watermarking Based on Complex Zernike Moment
by: Edris, Khalid, et al.
Published: (2014)
by: Edris, Khalid, et al.
Published: (2014)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
The usage of watermarking to store patient information and diagnosis in medical images
by: Razlinda , Abd Razak
Published: (2011)
by: Razlinda , Abd Razak
Published: (2011)
Similar Items
-
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016) -
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014) -
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015) -
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021) -
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)