A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fusion Framework for Robust and Secured Watermarking
2014
International Journal of Computer Applications
To introduce the secure watermarking, watermark is secured using Arnold Transformation and embedded in the cover image. ...
This paper presents a robust and secure watermarking technique for digital image. To implement the technique, Discrete Wavelet Transform (DWT) is applied on cover image. ...
-Pitas I and Kaskalis T. H. , 1995
Index Terms Computer Science Security ;Applying signatures on digital images. ...
doi:10.5120/17762-8873
fatcat:aw7splgd7feobhzj2q7ru3hkba
New Watermarking/Encryption Method for Medical Imaging FULL Protection in m-Health
2017
International Journal of Electrical and Computer Engineering (IJECE)
The purpose of the combination of these three proposed algorithms (encryption, robust hiding and fragile watermarking) is the full protection of medical imaging, its information and its report in terms ...
Then, we use a fragile LSB watermarking for hide, in spatial domain, the kw key and the entropy of imaging in itself for integrity check in encrypted domain. ...
PROPOSED WATERMARKING/ENCRYPTION SYSTEM In this section, we present the proposed security system for medical images. ...
doi:10.11591/ijece.v7i6.pp3385-3394
fatcat:ycznqgjthvcj5e5z5ublw7txve
Robust, Secure and High Capacity Watermarking Technique based on Image Partitioning-Merging Scheme
2016
International Journal of Information Technology and Computer Science
The technique is non-blind and tested with grey scale cover images of size 512x512 and watermark images of size 512x512. ...
This paper presents secure and high capacity watermarking technique using novel approach of Image Partitioning-Merging Scheme (IPMS). ...
They are less secured and support low payload hiding capacity, less perceptual quality of watermarked image and provide less correlation between embedded and extracted watermark. ...
doi:10.5815/ijitcs.2016.04.09
fatcat:nuwqp7qihrhchcqahrk4pf7cue
Secure Audio Watermarking based on Haar Wavelet and Discrete Cosine Transform
2015
International Journal of Computer Applications
In this paper, a secure way of Audio-Watermarking is implemented using Discrete Wavelet Transform (Haar Wavelet) and Discrete Cosine Transform. ...
And, techniques like steganography, watermarking and cryptography help us to do so. ...
And security of data is an issue. Though it can be achieved by cryptography, steganography or watermarking. ...
doi:10.5120/ijca2015905599
fatcat:vduse65sirh4voutdgfmuuyoz4
Medical Images Watermarking For Security In M-Health: Implementation On Smartphone Android Os
2018
Zenodo
Therefore, in this paper, a new security system for medical imaging dedicated for m-Health is presented which is based on the high capacity robust/fragile blind watermarking of audio report in medical ...
The objective of the paper is to concept a high capacity watermarking method which can store all audio report size. with an imperceptible watermark and an acceptable watermarked imaging quality and the ...
Acknowledgment We are grateful to the reviewers for their valuable comments that helped us to improve the quality of the paper. ...
doi:10.5281/zenodo.1227655
fatcat:6lqf5cyygrg3fjvciv5kbhev7e
StegoWall: blind statistical detection of hidden data
2002
Security and Watermarking of Multimedia Contents IV
The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and Internet/Network security. ...
Novel functional possibilities, provided by recent data hiding technologies, carry out the danger of uncontrolled (unauthorized) and unlimited information exchange that might be used by people with unfriendly ...
INTRODUCTION New possibilities of digital imaging and data hiding open wide prospects in modern imaging science, content management and secure communications. ...
doi:10.1117/12.465324
dblp:conf/sswmc/VoloshynovskiyH02
fatcat:6o2jvywucnhsrglikw4eez5m6q
Reversible Data Hiding Based on DNA Computing
2017
Computational Intelligence and Neuroscience
In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. ...
Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security. ...
Because of their features of parallelism, high-capacity storage, and low energy consumption, DNA computing is used into many fields, such as image encryption, information security, and other applications ...
doi:10.1155/2017/7276084
pmid:28280504
pmcid:PMC5320385
fatcat:ymk2inbv4vgebjemf5fcydoi7e
The use of computational intelligence in digital watermarking: Review, challenges, and new trends
2011
Neural Network World
Information hiding systems hide secret information into
an object, e.g., an audio, video, image, or written text, to create a watermarked
object. ...
Darwish et al. [6] presented a securing patient medical images and authentica-
tion system to increase the security, confidentiality and integrity of medical images
which is transmitted through the Internet ...
doi:10.14311/nnw.2011.21.017
fatcat:bygr6l7srzhijduwlh2or4zekm
Printed Document Watermarking Using Phase Modulation
2009
2009 Second International Conference on Emerging Trends in Engineering & Technology
Thus, with such a "lock and key" approach, it greatly improves the security level of the optical watermark. ...
An optical watermark is a two-dimensional binary image. It can be of any shape and can be printed on any part of a document. The hidden information is embedded using phase modulation. ...
Coordinate Mapping of the Basic Watermark Layer The basic dot array and hiding image is as shown below The binary image is embedded in dot array by phase modulation so that we get watermark layer. ...
doi:10.1109/icetet.2009.183
dblp:conf/icetet/HrishikeshS09
fatcat:nm3nphvekrfmffc5v27htohhhe
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing
2019
Journal of Real-Time Image Processing
for robust image watermarking, which simplifies the DCT/IDCT algorithms and only involves the addition and shift operations instead of the complex multiplication/division and nonlinear function. ...
Experimental results show that the proposed accelerator has good efficiency and excellent performance achieving robust image watermarking. ...
accelerator for robust image watermarking, which simplifies the DCT/IDCT algorithms and only involves the addition and shift operations instead of the complex multiplication/division and nonlinear function ...
doi:10.1007/s11554-019-00897-4
fatcat:7lffibsjsbarxivbbmuccqqkju
Audio Steganography to Protect the Confidential Information: A Survey
2017
International Journal of Computer Applications
Steganography is a science to hide information, it hides a message to another object, and it increases the security of data transmission and archiving it. ...
For steganography process, several methods have been developed; including work in the temporary and transformation, each of has its own advantages and disadvantages, and special function. ...
to the hidden data and the tissue of image It is not visible at majority of image structures
Cost
With low computational cost
With high computational cost
Table 3 . 3 Comparison of audio steganography ...
doi:10.5120/ijca2017914561
fatcat:2ak4cvgbezdynmy7ktds52uklq
Secured Data Hiding based on Compression Function and Quantization
2012
International Journal of Applied Information Systems
The scalar and the vector methods along with a secret key for data hiding will make the method more secure and efficient. The experimental results demonstrate the robustness of the proposed approach. ...
In this paper, Quantization Index Modulation and the compression function of µ-Law standards for quantization are used. ...
The authors would like to thank the Management, Principal and Staff of JNNCE Shimoga for their support. ...
doi:10.5120/ijais12-450109
fatcat:guwgd7svdrgoneyyezsxzxol6i
Hiding Secret Data Using Image Steganography
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. ...
In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. ...
RESULTS AND DISCUSSION Embedding a picture watermark Here is the full code of the DrawImage (Image) system, which makes all control of the image, and later will show the code for other details. ...
doi:10.32628/cseit119548
fatcat:gz57uioi3rdv7bvvzjp6blijba
Enhanced Framework for Ensuring Privacy Preserving Image Retrieval in Cloud
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Data hiding and ECC (Elliptic curve cryptosystem) based watermarking technique at cloud computing platform. ...
Once data is uploaded to cloud-platform, the privacy and security of image-data fully depend and believe upon cloud service provider honesty. ...
Data hiding and ECC based watermarking technique at cloud computing platform with reduced time. ...
doi:10.35940/ijitee.l3304.1081219
fatcat:fo6wz4za6zhn5fzayvlnf3v4yq
Genetic algorithms for optimality of data hiding in digital images
2008
Soft Computing - A Fusion of Foundations, Methodologies and Applications
This paper investigates the scope of usage of Genetic Algorithms (GA) for data hiding in digital images. ...
Two spatial domain data hiding methods are proposed where GA is used separately for (i) improvement in detection and (ii) optimal imperceptibility of hidden data in digital images respectively. ...
The stego image is shown in Fig. 2(a) and PSNR value for the watermarked image is 39.33 dB. The security of the hidden data is 0.00124. ...
doi:10.1007/s00500-008-0329-5
fatcat:bjncaut5wrahlprr7llg5qo3ka
« Previous
Showing results 1 — 15 out of 4,382 results