A secure HEVC video watermarking scheme for authentication and copyright purposes
High-Efficiency Video Coding (HEVC) becomes one of the widely deployed standards for multimedia applications. However, HEVC streams can be easily tampered by any third party, which negatively affects the authentication and copyright protection. Existing watermarking schemes used for copyright...
| Main Author: | Elrowayati, Ali Abdulhafid |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/883/ |
| Abstract | Abstract here |
Similar Items
Video authentication in HEVC compressed domain / Tew Yiqi
by: Tew, Yiqi
Published: (2016)
by: Tew, Yiqi
Published: (2016)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
by: El Omari, Abdullah Abdelmonem M.
Published: (2007)
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)
by: ., Maulidin
Published: (2011)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Improving computational complexity using I-zag for text image authentication scheme
by: ‘Aqilah, Abd. Ghani
Published: (2024)
by: ‘Aqilah, Abd. Ghani
Published: (2024)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
by: Usman , Ali
Published: (2024)
by: Usman , Ali
Published: (2024)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Searching Speech Keywords from Video
by: Daloull, Moustafa A. M.
Published: (2010)
by: Daloull, Moustafa A. M.
Published: (2010)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Kajian Kes Ke Atas Sistem Maklumat Sewaan Video Chimera (CVRIS)
by: Rafizah, Mohd Hanifa
Published: (2000)
by: Rafizah, Mohd Hanifa
Published: (2000)
Comparative study of robust invisible digital image watermarking for copyright protection
by: Nurshahirah Nadirah Jaafar
Published: (2025)
by: Nurshahirah Nadirah Jaafar
Published: (2025)
Custom Online Course Evaluation For IT Master Program At UUM
by: Dabob, Khalid Moftah Abdulhafid
Published: (2008)
by: Dabob, Khalid Moftah Abdulhafid
Published: (2008)
Perspective on selected sample on SDL in JAVA-an analysis of a learning module design for pre-evaluation purposes
by: Ibrahim, Zakir Hussain
Published: (2001)
by: Ibrahim, Zakir Hussain
Published: (2001)
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techniques
by: Abbas, Nidaa Hasan
Published: (2017)
by: Abbas, Nidaa Hasan
Published: (2017)
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013)
by: Faizul Hadi Mohamad Jamil
Published: (2013)
Image orientation watermarking technique for copyright protection
by: Jasim, Hend Muslim
Published: (2016)
by: Jasim, Hend Muslim
Published: (2016)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Simulation on Network Security Design Architecture for Server Room in Rwanda Information Technology Agency
by: Eric, Karerangabo
Published: (2009)
by: Eric, Karerangabo
Published: (2009)
The Challenges Of Understanding Security In Web Browser Case Study: Internet Explorer And Mozilla Firefox
by: Saleh, Ashraf Mousa
Published: (2008)
by: Saleh, Ashraf Mousa
Published: (2008)
Generic nodal abstraction for enhancing human-agent collaborative model with an integrated security and trust aspects
by: Mohammed, Khudair Abbas
Published: (2019)
by: Mohammed, Khudair Abbas
Published: (2019)
An enhanced anycast routing protocol using nearest PIM-SM tree distribution with load-balancing scheme / Jimmy Tan Kai Hong.
by: Tan, Jimmy Kai Hong
Published: (2003)
by: Tan, Jimmy Kai Hong
Published: (2003)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015)
by: Almas, Abbasi
Published: (2015)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Enhancing user authentication for cloud web-based application / Detar Beqo
by: Detar , Beqo
Published: (2018)
by: Detar , Beqo
Published: (2018)
Robust watermarking for digital PDF document for copyright protection
by: Amir Hesam Yaribakht
Published: (2025)
by: Amir Hesam Yaribakht
Published: (2025)
A selective approach for energy-aware video content adaptation decision-taking engine in android based smartphone
by: Abd Rahim, Mohd Hilmi Izwan
Published: (2019)
by: Abd Rahim, Mohd Hilmi Izwan
Published: (2019)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
by: Por, Lip Yee
Published: (2012)
by: Por, Lip Yee
Published: (2012)
Similar Items
-
Video authentication in HEVC compressed domain / Tew Yiqi
by: Tew, Yiqi
Published: (2016) -
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011) -
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018) -
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
by: El Omari, Abdullah Abdelmonem M.
Published: (2007) -
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)