A dual-watermarking with DR code against cropping and resizing attack
Watermarking is a pattern of bits inserted into a digital image, audio or video file (digital file) that identifies the file's ownership copyright information. It is one of the techniques to discourage illegal duplication of intellectual property. However, there is still a room for improvement...
| Auteur principal: | Lau, Wei Khang |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais anglais |
| Publié: |
2016
|
| Sujets: | |
| Accès en ligne: | http://eprints.uthm.edu.my/9953/ |
| Abstract | Abstract here |
Documents similaires
A dual-watermarking with QR code against cropping and resizing attack
par: Lau, Wei Khang
Publié: (2016)
par: Lau, Wei Khang
Publié: (2016)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
par: Said, Mohamed Abdisalan
Publié: (2015)
par: Said, Mohamed Abdisalan
Publié: (2015)
Tamper localization and recovery watermarking schemes for medical images in PACS
par: Liew, Siew Chuin
Publié: (2011)
par: Liew, Siew Chuin
Publié: (2011)
Watermark redundancy using sudoku
par: Ahmad Khalid, Shamsul Kamal
Publié: (2018)
par: Ahmad Khalid, Shamsul Kamal
Publié: (2018)
Web transcript verification using dual check digit as secure number
par: Abd Halim, Muhamad Rais
Publié: (2016)
par: Abd Halim, Muhamad Rais
Publié: (2016)
Code clone detection using string based tree matching technique
par: Wahid, Norfaradilla
Publié: (2008)
par: Wahid, Norfaradilla
Publié: (2008)
Digital Image Watermarking Using LSB Method
par: ., Maulidin
Publié: (2011)
par: ., Maulidin
Publié: (2011)
A secure HEVC video watermarking scheme for authentication and copyright purposes
par: Elrowayati, Ali Abdulhafid
Publié: (2020)
par: Elrowayati, Ali Abdulhafid
Publié: (2020)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
par: Then,, Patrick Hang Hui
Publié: (2007)
par: Then,, Patrick Hang Hui
Publié: (2007)
An extended access control list for local network protection from insider attacks
par: Muamer N., Mohammed
Publié: (2011)
par: Muamer N., Mohammed
Publié: (2011)
Tool-assisted model for software requirement negotiation
par: Lau, Hong Sheng
Publié: (2015)
par: Lau, Hong Sheng
Publié: (2015)
Information security risk management framework for Social Engineering attack and digital prevention techniques
par: Shekh Abdullah -Al-Musa Ahmed
Publié: (2020)
par: Shekh Abdullah -Al-Musa Ahmed
Publié: (2020)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
par: Low, Wei Shang
Publié: (2019)
par: Low, Wei Shang
Publié: (2019)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
par: Najmun, Najmun
Publié: (2024)
par: Najmun, Najmun
Publié: (2024)
A case tool for code inspection / by Siti Hajar binti Alias.
par: Alias, Siti Hajar
Publié: (2002)
par: Alias, Siti Hajar
Publié: (2002)
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
par: Ranjeet Singh, Bishan Singh
Publié: (2004)
par: Ranjeet Singh, Bishan Singh
Publié: (2004)
A press touch code based secure graphical password scheme for smart devices
par: Al Noman Ranak, Md Sayfullah
Publié: (2018)
par: Al Noman Ranak, Md Sayfullah
Publié: (2018)
Generating UML class diagram from source codes using multi-threading technique
par: Abdullah, Saif Khalid
Publié: (2015)
par: Abdullah, Saif Khalid
Publié: (2015)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
par: Mehdi , Malekzadeh
Publié: (2017)
par: Mehdi , Malekzadeh
Publié: (2017)
PDF digital watermarking grayscale photocopy detection of printed documents
par: Soong, Hoong Cheng
Publié: (2010)
par: Soong, Hoong Cheng
Publié: (2010)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
par: Ismail, Nurul Izzatty
Publié: (2016)
par: Ismail, Nurul Izzatty
Publié: (2016)
An improved bat algorithm with artificial neural networks for classification problems
par: Rehman Gillani, Syed Muhammad Zubair
Publié: (2016)
par: Rehman Gillani, Syed Muhammad Zubair
Publié: (2016)
Functional link neural network with modified bee-firefly learning algorithm for classification task
par: Mohmad Hassim, Yana Mazwin
Publié: (2016)
par: Mohmad Hassim, Yana Mazwin
Publié: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
par: Alsaedi, Ahmed Khalaf Zager
Publié: (2016)
par: Alsaedi, Ahmed Khalaf Zager
Publié: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
par: Alsaedi, Ahmed Khalaf Zager
Publié: (2016)
par: Alsaedi, Ahmed Khalaf Zager
Publié: (2016)
Test suite reduction in android application using refactoring
par: Ahmed, Maryam Temitayo
Publié: (2016)
par: Ahmed, Maryam Temitayo
Publié: (2016)
Comparison study on sorting techniques in static data structure
par: Naser Frak, Anwar
Publié: (2016)
par: Naser Frak, Anwar
Publié: (2016)
Design and simulation of variants of koch models for fractal antenna
par: Riaz, Ul Haq
Publié: (2011)
par: Riaz, Ul Haq
Publié: (2011)
Pemodelan rangkaian Neural Suap Balik bagi meramal harga rumah
par: Ghazali, Rozaida
Publié: (2003)
par: Ghazali, Rozaida
Publié: (2003)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
par: Ang, Tan Fong
Publié: (2011)
par: Ang, Tan Fong
Publié: (2011)
A model for federated data grid systems based on network core area
par: Mohamad, Zarina
Publié: (2013)
par: Mohamad, Zarina
Publié: (2013)
The comparative study of model-based and appearance Based gait recognition for leave bag behind
par: Zainol, Norfazilah
Publié: (2018)
par: Zainol, Norfazilah
Publié: (2018)
Computational intelligence method for optimal rotary design system
par: P.Saminathan, Kantan
Publié: (2008)
par: P.Saminathan, Kantan
Publié: (2008)
Web usage mining for UUM learning care using association rules
par: Ramli, Azizul Azhar
Publié: (2004)
par: Ramli, Azizul Azhar
Publié: (2004)
A secure message handler using microsoft cryptoapi
par: Eh Kan, Chessda Uttraphan
Publié: (2003)
par: Eh Kan, Chessda Uttraphan
Publié: (2003)
Sistem maklumat berkomputer: sistem maklumat untuk pensyarah (SIMPS)
par: Muhamed, Siti Anizah
Publié: (2002)
par: Muhamed, Siti Anizah
Publié: (2002)
Perspective on selected sample on SDL in JAVA-an analysis of a learning module design for pre-evaluation purposes
par: Ibrahim, Zakir Hussain
Publié: (2001)
par: Ibrahim, Zakir Hussain
Publié: (2001)
Specification of vertical semantic consistency rules of UML class diagram refinement using logical approach
par: Nuraini Abdulganiyyi, Nuraini
Publié: (2014)
par: Nuraini Abdulganiyyi, Nuraini
Publié: (2014)
A hybrid model for discovering significant patterns in data mining
par: Abdullah, Zailani
Publié: (2012)
par: Abdullah, Zailani
Publié: (2012)
Rough clustering for web transactions
par: Yanto, Iwan Tri Riyadi
Publié: (2011)
par: Yanto, Iwan Tri Riyadi
Publié: (2011)
Documents similaires
-
A dual-watermarking with QR code against cropping and resizing attack
par: Lau, Wei Khang
Publié: (2016) -
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
par: Said, Mohamed Abdisalan
Publié: (2015) -
Tamper localization and recovery watermarking schemes for medical images in PACS
par: Liew, Siew Chuin
Publié: (2011) -
Watermark redundancy using sudoku
par: Ahmad Khalid, Shamsul Kamal
Publié: (2018) -
Web transcript verification using dual check digit as secure number
par: Abd Halim, Muhamad Rais
Publié: (2016)
