A dual-watermarking with DR code against cropping and resizing attack
Watermarking is a pattern of bits inserted into a digital image, audio or video file (digital file) that identifies the file's ownership copyright information. It is one of the techniques to discourage illegal duplication of intellectual property. However, there is still a room for improvement...
| Main Author: | Lau, Wei Khang |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/9953/ |
| Abstract | Abstract here |
Similar Items
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)
by: ., Maulidin
Published: (2011)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
by: Lau, Hong Sheng
Published: (2015)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
by: Najmun, Najmun
Published: (2024)
by: Najmun, Najmun
Published: (2024)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
by: Low, Wei Shang
Published: (2019)
by: Low, Wei Shang
Published: (2019)
A case tool for code inspection / by Siti Hajar binti Alias.
by: Alias, Siti Hajar
Published: (2002)
by: Alias, Siti Hajar
Published: (2002)
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
by: Ranjeet Singh, Bishan Singh
Published: (2004)
by: Ranjeet Singh, Bishan Singh
Published: (2004)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
PDF digital watermarking grayscale photocopy detection of printed documents
by: Soong, Hoong Cheng
Published: (2010)
by: Soong, Hoong Cheng
Published: (2010)
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015)
by: Almas, Abbasi
Published: (2015)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Investigation of block matching algorithm for video coding
by: Faizul Hadi Mohamad Jamil
Published: (2013)
by: Faizul Hadi Mohamad Jamil
Published: (2013)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
by: Ismail, Nurul Izzatty
Published: (2016)
by: Ismail, Nurul Izzatty
Published: (2016)
An improved bat algorithm with artificial neural networks for classification problems
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
Functional link neural network with modified bee-firefly learning algorithm for classification task
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
Comparison study on sorting techniques in static data structure
by: Naser Frak, Anwar
Published: (2016)
by: Naser Frak, Anwar
Published: (2016)
Design and simulation of variants of koch models for fractal antenna
by: Riaz, Ul Haq
Published: (2011)
by: Riaz, Ul Haq
Published: (2011)
Pemodelan rangkaian Neural Suap Balik bagi meramal harga rumah
by: Ghazali, Rozaida
Published: (2003)
by: Ghazali, Rozaida
Published: (2003)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
A model for federated data grid systems based on network core area
by: Mohamad, Zarina
Published: (2013)
by: Mohamad, Zarina
Published: (2013)
The comparative study of model-based and appearance Based gait recognition for leave bag behind
by: Zainol, Norfazilah
Published: (2018)
by: Zainol, Norfazilah
Published: (2018)
Computational intelligence method for optimal rotary design system
by: P.Saminathan, Kantan
Published: (2008)
by: P.Saminathan, Kantan
Published: (2008)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Sistem maklumat berkomputer: sistem maklumat untuk pensyarah (SIMPS)
by: Muhamed, Siti Anizah
Published: (2002)
by: Muhamed, Siti Anizah
Published: (2002)
Similar Items
-
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016) -
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015) -
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011) -
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018) -
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
