Watermark redundancy using sudoku
In today’s world, designer of a watermarking system had to constantly faced with determined attacks to remove copyright information from a watermarked cover image. Due to these attacks, a watermark could be seriously corrupted and not detectable anymore or the watermark could be so noisy that it’s p...
| Main Author: | Ahmad Khalid, Shamsul Kamal |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/173/ |
| Abstract | Abstract here |
Similar Items
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)
by: ., Maulidin
Published: (2011)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
A comparative analysis of data redundancy and execution time between relational and object oriented schema table
by: Alakari, Salim Tahir
Published: (2014)
by: Alakari, Salim Tahir
Published: (2014)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015)
by: Almas, Abbasi
Published: (2015)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
Sistem Maklumat Akademik UUM
by: Ruzelan, Khalid
Published: (2002)
by: Ruzelan, Khalid
Published: (2002)
Evaluation of Search Result of Document Search Based GA (DSEGA)
by: Kamal Norfarid, Kamaruddin
Published: (2004)
by: Kamal Norfarid, Kamaruddin
Published: (2004)
An Evaluation Of Artificial Neural Network In Predicting The Presence Of Heart Disease
by: Mohd Khalid, Awang
Published: (2000)
by: Mohd Khalid, Awang
Published: (2000)
Web-Based Telephone Extension Directory System For Menara Celcom
by: Khairul Hisham, Khalid
Published: (2008)
by: Khairul Hisham, Khalid
Published: (2008)
Precision Horticulture: A Mobile System to Support Agriculture Yield.
by: Adwan, Kamal A. M.
Published: (2007)
by: Adwan, Kamal A. M.
Published: (2007)
Integration of Student Information Data Using XML
by: Mohd Amar Maarof, Ahmad
Published: (2008)
by: Mohd Amar Maarof, Ahmad
Published: (2008)
Custom Online Course Evaluation For IT Master Program At UUM
by: Dabob, Khalid Moftah Abdulhafid
Published: (2008)
by: Dabob, Khalid Moftah Abdulhafid
Published: (2008)
Mobile Computing at Sultanah Bahiyah Library : Mapping Physical Book Rack Location Using Handheld Devices
by: Ahmad Nurzid, Rosli
Published: (2004)
by: Ahmad Nurzid, Rosli
Published: (2004)
Lightweight energy estimation framework for smart-phone applications using static analysis / Raja Wasim Ahmad
by: Raja Wasim , Ahmad
Published: (2017)
by: Raja Wasim , Ahmad
Published: (2017)
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
by: Nikfal, Shima
Published: (2007)
by: Nikfal, Shima
Published: (2007)
Mobile Searching And Ordering System For Canon Company
by: Sari Kamal, Moh'd Al-Rifaee
Published: (2008)
by: Sari Kamal, Moh'd Al-Rifaee
Published: (2008)
Developing E-learning Web Based Using ADDIE Model In Engineering Department For ACM
by: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Published: (2008)
by: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Published: (2008)
Modeling Teacher's Integrity Using Data Mining
by: Mohd Latifi, Abdul Ghani
Published: (2010)
by: Mohd Latifi, Abdul Ghani
Published: (2010)
The Use of Multimedia Material of Teaching Modern Mathematics
by: Layous, Mohammad Kaisb
Published: (2011)
by: Layous, Mohammad Kaisb
Published: (2011)
Analyzing DNA Sequences Using Clustering Algorithm
by: Alhersh, Taha Talib Ragheb
Published: (2009)
by: Alhersh, Taha Talib Ragheb
Published: (2009)
Software Classification Using Structure-Based Descriptors
by: Ramadan, Qusai Hussein
Published: (2009)
by: Ramadan, Qusai Hussein
Published: (2009)
Predicting The Area Of Specialization Using Neural Network
by: Nurulisma, Hj. Ismail
Published: (2002)
by: Nurulisma, Hj. Ismail
Published: (2002)
Psychology Test Using HyperCard On The Macintosh
by: Norida, Muhd Darus
Published: (1995)
by: Norida, Muhd Darus
Published: (1995)
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
Log Mining Using Generalized Association Rules
by: Mohd. Helmy, Abd. Wahab
Published: (2004)
by: Mohd. Helmy, Abd. Wahab
Published: (2004)
Visualizing Student Performances Using Data Mining Techniques.
by: Sri Banu, Munisamy
Published: (2007)
by: Sri Banu, Munisamy
Published: (2007)
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)
by: Ghayab, Hadi Ratham
Published: (2010)
Adaptive Selection Of KLSE Stocks Using Neural Networks
by: Kok, Chee Foong
Published: (2002)
by: Kok, Chee Foong
Published: (2002)
Using Visualization as an Easy Way to Learn Programming Logic
by: Loo, Sze Phei
Published: (2009)
by: Loo, Sze Phei
Published: (2009)
Development Of Teleresearch Model Using Open Source Software
by: Rajendaran, Chellappan Pillai
Published: (2008)
by: Rajendaran, Chellappan Pillai
Published: (2008)
Academic Achievement Prediction Model Using Neural Networks
by: Normaziah, Abdul Rahman
Published: (2002)
by: Normaziah, Abdul Rahman
Published: (2002)
Measuring Business Process Complexity Using Cyclomatic Number
by: Sharifah Intan Eriyatty, Syed Mansor
Published: (2004)
by: Sharifah Intan Eriyatty, Syed Mansor
Published: (2004)
Product Recommendation for E-Groceries Using Apriori Algorithm
by: Muziah, Muhammad
Published: (2004)
by: Muziah, Muhammad
Published: (2004)
Analyzing Primary Student Data Using Data Mining
by: Chong, Sze Wei
Published: (2009)
by: Chong, Sze Wei
Published: (2009)
Similar Items
-
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011) -
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020) -
A comparative analysis of data redundancy and execution time between relational and object oriented schema table
by: Alakari, Salim Tahir
Published: (2014) -
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011) -
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)