A dual-watermarking with DR code against cropping and resizing attack
Watermarking is a pattern of bits inserted into a digital image, audio or video file (digital file) that identifies the file's ownership copyright information. It is one of the techniques to discourage illegal duplication of intellectual property. However, there is still a room for improvement...
| Main Author: | Lau, Wei Khang |
|---|---|
| Format: | Dissertation |
| Language: | English English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/9953/ |
| Abstract | Abstract here |
Similar Items
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)
by: ., Maulidin
Published: (2011)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Tool-assisted model for software requirement negotiation
by: Lau, Hong Sheng
Published: (2015)
by: Lau, Hong Sheng
Published: (2015)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
User Acceptance Of Mobile Augmented Reality For Tourism By Adopting The UTAUT Model
by: Low, Wei Shang
Published: (2019)
by: Low, Wei Shang
Published: (2019)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
by: Najmun, Najmun
Published: (2024)
by: Najmun, Najmun
Published: (2024)
A case tool for code inspection / by Siti Hajar binti Alias.
by: Alias, Siti Hajar
Published: (2002)
by: Alias, Siti Hajar
Published: (2002)
A Simulation Model for the Handling of Raw Materials at the Bar Code Process
by: Ranjeet Singh, Bishan Singh
Published: (2004)
by: Ranjeet Singh, Bishan Singh
Published: (2004)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
A feature-based dual-layer ensemble classification method for emotional state recognition / Mehdi Malekzadeh
by: Mehdi , Malekzadeh
Published: (2017)
by: Mehdi , Malekzadeh
Published: (2017)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
by: Ismail, Nurul Izzatty
Published: (2016)
by: Ismail, Nurul Izzatty
Published: (2016)
An improved bat algorithm with artificial neural networks for classification problems
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
Functional link neural network with modified bee-firefly learning algorithm for classification task
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
Comparison study on sorting techniques in static data structure
by: Naser Frak, Anwar
Published: (2016)
by: Naser Frak, Anwar
Published: (2016)
Design and simulation of variants of koch models for fractal antenna
by: Riaz, Ul Haq
Published: (2011)
by: Riaz, Ul Haq
Published: (2011)
An adaptive QOS scheduling algorithm in service oriented grid and cloud environment / Ang Tan Fong
by: Ang, Tan Fong
Published: (2011)
by: Ang, Tan Fong
Published: (2011)
A model for federated data grid systems based on network core area
by: Mohamad, Zarina
Published: (2013)
by: Mohamad, Zarina
Published: (2013)
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
by: Lateh, Masitah bdul
Published: (2020)
by: Lateh, Masitah bdul
Published: (2020)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
The enhancement of gamification leader board model based on player type to increase learning engagement
by: Daud, Rafizah
Published: (2019)
by: Daud, Rafizah
Published: (2019)
Production quantity estimation using an improved artificial neural network
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
by: Mat Esa, Asmarizan
Published: (2015)
by: Mat Esa, Asmarizan
Published: (2015)
Online reservation system for Al-Kindi General Hospital
by: Bdair Hashim, Hasan
Published: (2015)
by: Bdair Hashim, Hasan
Published: (2015)
Dyscreen : cross-platform dyslexia screening test for Malaysian children through hybrid applications
by: Leong, Pui Huang
Published: (2015)
by: Leong, Pui Huang
Published: (2015)
Logical approach : consistency rules between activity diagram and class diagram
by: Sulaiman, Noraini
Published: (2015)
by: Sulaiman, Noraini
Published: (2015)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
Similar Items
-
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016) -
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015) -
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011) -
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016) -
Watermark redundancy using sudoku
by: Ahmad Khalid, Shamsul Kamal
Published: (2018)
