Academic literature on the topic 'SECURE WATERMARKING'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SECURE WATERMARKING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SECURE WATERMARKING"

1

Nidal, F. Shilbayeh* Sameer A. Nooh. "A SECURE WEB BASED WATERMARKING SCHEME." Global Journal of Engineering Science and Research Management 7, no. 1 (2020): 61–69. https://doi.org/10.5281/zenodo.3632555.

Full text
Abstract:
Applying watermarking protocols can effectively support the copyright protection to identify illegal distributors over the World Wide Web. Several schemes have been developed for copyright protection of the web based digital contents distributed over the internet. However, these protocols are often needs more complex security actions to be performed by the web based content providers for preserving the integrity of their content. In this paper, we propose a new secure web-based watermarking scheme based on the combination of the security of the public key cryptosystem (PKI) and the watermarkin
APA, Harvard, Vancouver, ISO, and other styles
2

Masadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.

Full text
Abstract:
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones, teleconferences, etc.) and to improve the security of various organizations. In the article, the authors focus on securing all the contents of e-Commerce by proposing a public key watermarking algorithm for web content integrity verification. The main purpose of this article is to present a new security system that enables e-Commerce to exchange data more securely and by altering the file content structure, detecting illegal
APA, Harvard, Vancouver, ISO, and other styles
3

Didi, Rosiyadi, Indra Basuki Akbari, Iqbal Ramdhani Taufik, Susanto Heru, and Hasani Siregar Yusnan. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388–400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400.

Full text
Abstract:
Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-KimKim-Son (CKKS)
APA, Harvard, Vancouver, ISO, and other styles
4

Rosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.

Full text
Abstract:
<p>Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-Kim-Kim-
APA, Harvard, Vancouver, ISO, and other styles
5

Kou, Weidong. "Watermarking protocol of secure verification." Journal of Electronic Imaging 16, no. 4 (2007): 043002. http://dx.doi.org/10.1117/1.2804233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xuelong. "Watermarking in secure image retrieval." Pattern Recognition Letters 24, no. 14 (2003): 2431–34. http://dx.doi.org/10.1016/s0167-8655(03)00072-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, J., W. Kou, and K. Fan. "Secure buyer–seller watermarking protocol." IEE Proceedings - Information Security 153, no. 1 (2006): 15. http://dx.doi.org/10.1049/ip-ifs:20055069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview." Electronics 10, no. 14 (2021): 1744. http://dx.doi.org/10.3390/electronics10141744.

Full text
Abstract:
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the I
APA, Harvard, Vancouver, ISO, and other styles
9

Yu, Chuying, Xiaowei Li, Xinan Chen, and Jianzhong Li. "An Adaptive and Secure Holographic Image Watermarking Scheme." Entropy 21, no. 5 (2019): 460. http://dx.doi.org/10.3390/e21050460.

Full text
Abstract:
A novel adaptive secure holographic image watermarking method in the sharp frequency localized contourlet transform (SFLCT) domain is presented. Based upon the sine logistic modulation map and the logistic map, we develop an encrypted binary computer-generated hologram technique to fabricate a hologram of a watermark first. Owing to the enormous key space of the encrypted hologram, the security of the image watermarking system is increased. Then the hologram watermark is embedded into the SFLCT coefficients with Schur decomposition. To obtain better imperceptibility and robustness, the entropy
APA, Harvard, Vancouver, ISO, and other styles
10

Umamageswari, A., and G. R. Suresh. "Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (2015): 544. http://dx.doi.org/10.11591/tijee.v15i3.1573.

Full text
Abstract:
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which provides confidentiality, integrity and authentication by embedding Digital Signature (DS) with the Medical image. In this paper we focus on need for reversible watermarking, Medical Image Compression and security related problems in medical images, it comparing the performances of various lossless watermarking techniques for various medical
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SECURE WATERMARKING"

1

Noorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.

Full text
Abstract:
The objective of this thesis is to present a robust watermarking algorithm for H.264 and to address challenges in compressed-domain video watermarking. To embed a perceptually invisible watermark in highly compressed H.264 video, we use a human visual model. We extend Watson's human visual model developed for 8x8 DCT block to the 4x4 block used in H.264. In addition, we use P-frames to increase the watermark payload. The challenge in embedding the watermark in P-frames is that the video bit rate can increase significantly. By using the structure of the encoder, we significantly reduce the incr
APA, Harvard, Vancouver, ISO, and other styles
2

Schäfer, Marcel [Verfasser], Michael [Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112332782/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schäfer, Marcel [Verfasser], Michael Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] [Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-52449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Okada, Mitsuo. "Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading." 京都大学 (Kyoto University), 2011. http://hdl.handle.net/2433/147349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Adamo, Oluwayomi Bamidele. "VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5393/.

Full text
Abstract:
This thesis presents a secure digital camera (SDC) that inserts biometric data into images found in forms of identification such as the newly proposed electronic passport. However, putting biometric data in passports makes the data vulnerable for theft, causing privacy related issues. An effective solution to combating unauthorized access such as skimming (obtaining data from the passport's owner who did not willingly submit the data) or eavesdropping (intercepting information as it moves from the chip to the reader) could be judicious use of watermarking and encryption at the source end of t
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Nu'aimi, Abdallah S. N. A. "Design, Implementation and Performance Evaluation of Robust and Secure Watermarking Techniques for Digital Coloured Images. Designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.

Full text
Abstract:
The tremendous spreading of multimedia via Internet motivates the watermarking as a new promising technology for copyright protection. This work is concerned with the design and development of novel algorithms in the spatial and transform domains for robust and secure watermarking of coloured images. These algorithms are adaptive, content-dependent and compatible with the Human Visual System (HVS). The host channels have the ability to host a large information payload. Furthermore, it has enough capacity to accept multiple watermarks. Abstract This work achieves several contributions in the
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Nu'aimi, Abdallah Saleem Na. "Design, implementation and performance evaluation of robust and secure watermarking techniques for digital coloured images : designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.

Full text
Abstract:
The tremendous spreading of multimedia via Internet motivates the watermarking as a new promising technology for copyright protection. This work is concerned with the design and development of novel algorithms in the spatial and transform domains for robust and secure watermarking of coloured images. These algorithms are adaptive, content-dependent and compatible with the Human Visual System (HVS). The host channels have the ability to host a large information payload. Furthermore, it has enough capacity to accept multiple watermarks. Abstract This work achieves several contributions in the ar
APA, Harvard, Vancouver, ISO, and other styles
8

Bellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.

Full text
Abstract:
La mutualisation et l'externalisation de données concernent de nombreux domaines y compris celui de la santé. Au-delà de la réduction des coûts de maintenance, l'intérêt est d'améliorer la prise en charge des patients par le déploiement d'outils d'aide au diagnostic fondés sur la réutilisation des données. Dans un tel environnement, la sécurité des données (confidentialité, intégrité et traçabilité) est un enjeu majeur. C'est dans ce contexte que s'inscrivent ces travaux de thèse. Ils concernent en particulier la sécurisation des techniques de recherche d'images par le contenu (CBIR) et de « m
APA, Harvard, Vancouver, ISO, and other styles
9

Almohammad, Adel. "Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4634.

Full text
Abstract:
Unlike encryption, steganography hides the very existence of secret information rather than hiding its meaning only. Image based steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. Related to this, we also investigate h
APA, Harvard, Vancouver, ISO, and other styles
10

Soderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.

Full text
Abstract:
Abstract The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS). The aim of this thesis is to de
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SECURE WATERMARKING"

1

Patel, Krunal N. Robust and Secured Digital Audio Watermarking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-53911-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patel, Krunal N. Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SECURE WATERMARKING"

1

Anitha, K. "Digital Watermarking: Pathway to Secure!" In Multimedia Watermarking. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9803-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kalker, Ton, and Mike Malkin. "Secure Quantization Index Modulation Watermark Detection." In Digital Watermarking. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lemma, Aweke, Stefan Katzenbeisser, Mehmet Celik, and Michiel van der Veen. "Secure Watermark Embedding Through Partial Encryption." In Digital Watermarking. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhu, Yan, Dengguo Feng, and Wei Zou. "Collusion Secure Convolutional Spread Spectrum Fingerprinting." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Doërr, Gwenaël, and Jean-Luc Dugelay. "Secure Video Watermarking via Embedding Strength Modulation." In Digital Watermarking. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Jeong Jae, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, and IL Hwan Park. "A Secure Steganographic Scheme against Statistical Analyses." In Digital Watermarking. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Angela S. L., Matthew Sorell, and Robert Clarke. "Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

He, HongJie, JiaShu Zhang, and Heng-Ming Tai. "A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication." In Digital Watermarking. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Zhongxuan, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, and Haila Wang. "Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption." In Digital Watermarking. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92238-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Amit Kumar, Basant Kumar, Ghanshyam Singh, and Anand Mohan. "Secure Multiple Watermarking Technique Using Neural Networks." In Medical Image Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57699-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SECURE WATERMARKING"

1

Amruth, S. Jaya, V. Sai Shruthik, and Sarada Jayan. "Secure Data Embedding using Fourier Transform-based Watermarking." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tabrizchi, Sepehr, Shaahin Angizi, and Arman Roohi. "iSEW: in-Sensor Embedded Watermarking for Secure Imaging." In 2025 IEEE 33rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 2025. https://doi.org/10.1109/fccm62733.2025.00076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

S, Mohandass, Dhanya S. T, Krishna Priya R, Kiruthiga M, and Siva P. M. "Deep Learning-based Brain Tumor Segmentation and Secure Watermarking." In 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). IEEE, 2025. https://doi.org/10.1109/iccies63851.2025.11032346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xin, Xiang, Honggang Wang, and Hua Fang. "SynthEcho Watermarking for Secure and Robust Image-to-Image Generation." In 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, 2024. http://dx.doi.org/10.1109/icdcsw63686.2024.00025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Uluturk, Ceyda, Fidan Akdeniz, Melike Varol, and Wisam Elmasry. "Secure, Robust and Optimized Algorithm: Towards Enhancing Digital Image Watermarking." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710930.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

K, Nandhini, and R. Rajkumar. "Secure and Reversible Medical Image Watermarking for E-Healthcare Applications." In 2025 6th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI). IEEE, 2025. https://doi.org/10.1109/icmcsi64620.2025.10883636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raval, Mehul S., Priti P. Rege, and S. K. Parulkar. "Secure and robust watermarking technique." In TENCON 2012 - 2012 IEEE Region 10 Conference. IEEE, 2012. http://dx.doi.org/10.1109/tencon.2012.6412274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xie, Fuchun, Teddy Furon, and Caroline Fontaine. "Towards robust and secure watermarking." In the 12th ACM workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1854229.1854258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mehra, Neelesh, and Madhu Shandilya. "Dual watermarking scheme for secure buyer-seller watermarking protocol." In Fourth International Conference on Digital Image Processing (ICDIP 2012), edited by Mohamed Othman, Sukumar Senthilkumar, and Xie Yi. SPIE, 2012. http://dx.doi.org/10.1117/12.956459.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Loo, P. "Digital watermarking with complex wavelets." In IEE Seminar on Secure Images and Image Authentication. IEE, 2000. http://dx.doi.org/10.1049/ic:20000221.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SECURE WATERMARKING"

1

Xie, Le. Secure Monitoring and Control of Solar Power Distribution System through Dynamic Watermarking. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2523662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!