A robust image watermarking technique based on Cox 's DCT to against rotation attack
Also available in printed version : TK7895.S62 Z343 2013 raf
| Main Author: | Seyed Mohamad Bagher Shafieinasab Langeroudi |
|---|---|
| Other Authors: | Mazdak Zamani, supervisor |
| Format: | Master's thesis |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/101693 |
| Abstract | Abstract here |
Similar Items
Digital image watermarking based on three levels discrete wavelet transform to achieve robustness against geometrical attacks
by: Zahra Sadat Shams Dolatabadi
Published: (2025)
by: Zahra Sadat Shams Dolatabadi
Published: (2025)
Robust color image watermarking using discrete wavelet transform, discrete cosine transform and cat face transform
by: Amir Hesam Yaribakht Razak
Published: (2025)
by: Amir Hesam Yaribakht Razak
Published: (2025)
Watermarking text document image using pascal triangle approach
by: Samar Kamil Khudhair
Published: (2025)
by: Samar Kamil Khudhair
Published: (2025)
RGB color image watermarking using discrete cosine transform
by: Alzahrani Jalal Nasser
Published: (2025)
by: Alzahrani Jalal Nasser
Published: (2025)
Tamper detection of qur�anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)
Robust watermarking for digital PDF document for copyright protection
by: Amir Hesam Yaribakht
Published: (2025)
by: Amir Hesam Yaribakht
Published: (2025)
High capacity of reversible watermarking for military images using integer wavelet transform scheme
by: Noorfadzilla Abd Yusuf
Published: (2025)
by: Noorfadzilla Abd Yusuf
Published: (2025)
Reversible watermarking for encrypted secret messages in medical image using enhancement of difference expansion
by: Wan Ainul Alyani Wan Mohamed
Published: (2025)
by: Wan Ainul Alyani Wan Mohamed
Published: (2025)
RGB colour image watermarking using canny edge detection and Discrete Wavelet Transform (DWT)
by: Sia, Hwee Boon
Published: (2025)
by: Sia, Hwee Boon
Published: (2025)
Reversible watermarking by using weighted median
by: Arwa Abdlullah A. Alshaya
Published: (2025)
by: Arwa Abdlullah A. Alshaya
Published: (2025)
Reversible watermarking by using weighted median
by: Arwa Abdlullah A Alshaya
Published: (2025)
by: Arwa Abdlullah A Alshaya
Published: (2025)
Multilayer reversible watermarking using non-underflow difference expansion
by: Mohd. Shahidan Abdullah
Published: (2025)
by: Mohd. Shahidan Abdullah
Published: (2025)
Enhancement of human vision sensitivits for watermarking performance using wavelet packet transformationy feature
by: Abduljabbar Hasan Mohammed Shaamala
Published: (2025)
by: Abduljabbar Hasan Mohammed Shaamala
Published: (2025)
An enhanced chaotic encryption method for fragile watermarking
by: Sima Boujarian
Published: (2025)
by: Sima Boujarian
Published: (2025)
Enhancement on perceptibility and robustness of watermarking domain scheme on halal logo authentication in QR code using discrete cosine transform
by: Fadzilawati Kaini
Published: (2025)
by: Fadzilawati Kaini
Published: (2025)
Robust and secure discrete wavelet transform based watermarking scheme two-level singular value decomposition
by: Tanya Koohpayeh Araghi
Published: (2025)
by: Tanya Koohpayeh Araghi
Published: (2025)
Efficient 2-level image tamper detection using 3 LSB watermarking technique
by: Sajjad Dadkhah
Published: (2025)
by: Sajjad Dadkhah
Published: (2025)
Improved capacity for real-time video watermarking
by: Shahidah Mahbob
Published: (2025)
by: Shahidah Mahbob
Published: (2025)
Matlab implementation of digital watermaking using FFT algorithm
by: Goh, Kam Meng
Published: (2025)
by: Goh, Kam Meng
Published: (2025)
Enhancing the security of high payload image steganography using chaos
by: Rezza Moieni
Published: (2025)
by: Rezza Moieni
Published: (2025)
The robust steganography technique based on location look-up table (LLUT)
by: Abdulrashid Abba Ali
Published: (2025)
by: Abdulrashid Abba Ali
Published: (2025)
Copy-move forgery detection using overlapping block approach with fusion of zernike moment and DCT transform
by: Gelareh Majid
Published: (2025)
by: Gelareh Majid
Published: (2025)
Optimize perceptuality of digital image from encryption based on quadtree
by: Hussein A. Hussein
Published: (2025)
by: Hussein A. Hussein
Published: (2025)
Image reconstruction validation from cmos linear image sensor based tomography system
by: Ang, Miin Shan
Published: (2025)
by: Ang, Miin Shan
Published: (2025)
Versatile enhanced encryption process (VEEP) for improved security in general purpose embedded device communication
by: Muhammad Farhan Abu Bakar
Published: (2025)
by: Muhammad Farhan Abu Bakar
Published: (2025)
Preventing web defacement using encryption technique
by: Mazuin Nihar Noor Ali
Published: (2025)
by: Mazuin Nihar Noor Ali
Published: (2025)
An index based searchable encryption scheme with IND-CCA security
by: Majid Nateghizad
Published: (2025)
by: Majid Nateghizad
Published: (2025)
A robust against rotation attack watermaking technique based on wavelet transform
by: Reza Aghababaeyan
Published: (2025)
by: Reza Aghababaeyan
Published: (2025)
Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithm
by: Then, Siaw Cheik
Published: (2025)
by: Then, Siaw Cheik
Published: (2025)
2-D DWT system architecture for image compression
by: Ang Boon Hui
Published: (2025)
by: Ang Boon Hui
Published: (2025)
Fingerprint image enhancement (Fulltext)
Published: (2025)
Published: (2025)
Determinants of auditors' usage of digital analysis audit software / Nortasha Ismail
by: Ismail, Nortasha
Published: (2014)
by: Ismail, Nortasha
Published: (2014)
DCT domain Stegasvm-shifted LSB model for highly
imperceptible and robust cover-image / Hanizan Shaker Hussain
by: Shaker Hussain, Hanizan
Published: (2014)
by: Shaker Hussain, Hanizan
Published: (2014)
Business process management (BPM) framework for GIRO transfer in Malaysia
by: Nurulbahtiah Mahmud Mahayudin
Published: (2025)
by: Nurulbahtiah Mahmud Mahayudin
Published: (2025)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Atefeh Mirzaee
Published: (2025)
by: Atefeh Mirzaee
Published: (2025)
Implementation of PKCS11 and PKCS12 cryptographic functions in.net for scan associates
by: Pirooz Kiani Kori
Published: (2025)
by: Pirooz Kiani Kori
Published: (2025)
Implementing prototype method for electronic payment facility of certificate servicing system in MAA Takaful
by: Priya Kasi
Published: (2025)
by: Priya Kasi
Published: (2025)
Semantics oriented approach for image retrieval in low complex scenes
by: Wang Hui Hu
Published: (2025)
by: Wang Hui Hu
Published: (2025)
Developing geospatial data model for geology in accordance to MSI759
by: Ng,Yen Yi
Published: (2025)
by: Ng,Yen Yi
Published: (2025)
Menganggarkan kadaralir puncak untuk tempoh dan keamatan hujan yang berlainan dengan menggunakan kaedah hidrograf bagi sungai Johor
by: Nurul Wahedda Rosli
Published: (2025)
by: Nurul Wahedda Rosli
Published: (2025)
Similar Items
-
Digital image watermarking based on three levels discrete wavelet transform to achieve robustness against geometrical attacks
by: Zahra Sadat Shams Dolatabadi
Published: (2025) -
Robust color image watermarking using discrete wavelet transform, discrete cosine transform and cat face transform
by: Amir Hesam Yaribakht Razak
Published: (2025) -
Watermarking text document image using pascal triangle approach
by: Samar Kamil Khudhair
Published: (2025) -
RGB color image watermarking using discrete cosine transform
by: Alzahrani Jalal Nasser
Published: (2025) -
Tamper detection of qur�anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)