Academic literature on the topic 'SECURE WATERMARKING'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SECURE WATERMARKING.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SECURE WATERMARKING"
Nidal, F. Shilbayeh* Sameer A. Nooh. "A SECURE WEB BASED WATERMARKING SCHEME." Global Journal of Engineering Science and Research Management 7, no. 1 (2020): 61–69. https://doi.org/10.5281/zenodo.3632555.
Full textMasadeh, Shadi R., Shadi Aljawarneh, Ashraf Odeh, and Abdullah Alhaj. "Secure Communication." International Journal of Information Security and Privacy 7, no. 4 (2013): 1–10. http://dx.doi.org/10.4018/ijisp.2013100101.
Full textDidi, Rosiyadi, Indra Basuki Akbari, Iqbal Ramdhani Taufik, Susanto Heru, and Hasani Siregar Yusnan. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388–400. https://doi.org/10.11591/ijece.v13i4.pp4388-4400.
Full textRosiyadi, Didi, Akbari Indra Basuki, Taufik Iqbal Ramdhani, Heru Susanto, and Yusnan Hasani Siregar. "Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4388. http://dx.doi.org/10.11591/ijece.v13i4.pp4388-4400.
Full textKou, Weidong. "Watermarking protocol of secure verification." Journal of Electronic Imaging 16, no. 4 (2007): 043002. http://dx.doi.org/10.1117/1.2804233.
Full textLi, Xuelong. "Watermarking in secure image retrieval." Pattern Recognition Letters 24, no. 14 (2003): 2431–34. http://dx.doi.org/10.1016/s0167-8655(03)00072-2.
Full textZhang, J., W. Kou, and K. Fan. "Secure buyer–seller watermarking protocol." IEE Proceedings - Information Security 153, no. 1 (2006): 15. http://dx.doi.org/10.1049/ip-ifs:20055069.
Full textWazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview." Electronics 10, no. 14 (2021): 1744. http://dx.doi.org/10.3390/electronics10141744.
Full textYu, Chuying, Xiaowei Li, Xinan Chen, and Jianzhong Li. "An Adaptive and Secure Holographic Image Watermarking Scheme." Entropy 21, no. 5 (2019): 460. http://dx.doi.org/10.3390/e21050460.
Full textUmamageswari, A., and G. R. Suresh. "Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking." TELKOMNIKA Indonesian Journal of Electrical Engineering 15, no. 3 (2015): 544. http://dx.doi.org/10.11591/tijee.v15i3.1573.
Full textDissertations / Theses on the topic "SECURE WATERMARKING"
Noorkami, Maneli. "Secure and Robust Compressed-Domain Video Watermarking for H.264." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16267.
Full textSchäfer, Marcel [Verfasser], Michael [Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/1112332782/34.
Full textSchäfer, Marcel [Verfasser], Michael Akademischer Betreuer] Waidner, Rüdiger [Akademischer Betreuer] Grimm, and Martin [Akademischer Betreuer] [Steinebach. "Collusion Secure Fingerprint Watermarking / Marcel Schäfer. Betreuer: Michael Waidner ; Rüdiger Grimm ; Martin Steinebach." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://nbn-resolving.de/urn:nbn:de:tuda-tuprints-52449.
Full textOkada, Mitsuo. "Asymmetric and Pseudo-Blind Digital Watermarking for Fair and Privacy-Secure Digital Content Trading." 京都大学 (Kyoto University), 2011. http://hdl.handle.net/2433/147349.
Full textAdamo, Oluwayomi Bamidele. "VLSI Architecture and FPGA Prototyping of a Secure Digital Camera for Biometric Application." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5393/.
Full textAl-Nu'aimi, Abdallah S. N. A. "Design, Implementation and Performance Evaluation of Robust and Secure Watermarking Techniques for Digital Coloured Images. Designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.
Full textAl-Nu'aimi, Abdallah Saleem Na. "Design, implementation and performance evaluation of robust and secure watermarking techniques for digital coloured images : designing new adaptive and robust imaging techniques for embedding and extracting 2D watermarks in the spatial and transform domain using imaging and signal processing techniques." Thesis, University of Bradford, 2009. http://hdl.handle.net/10454/4255.
Full textBellafqira, Reda. "Chiffrement homomorphe et recherche par le contenu sécurisé de données externalisées et mutualisées : Application à l'imagerie médicale et l'aide au diagnostic." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0063.
Full textAlmohammad, Adel. "Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4634.
Full textSoderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.
Full textBooks on the topic "SECURE WATERMARKING"
Patel, Krunal N. Robust and Secured Digital Audio Watermarking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-53911-5.
Full textPatel, Krunal N. Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach. Springer International Publishing AG, 2020.
Find full text(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.
Find full textBook chapters on the topic "SECURE WATERMARKING"
Anitha, K. "Digital Watermarking: Pathway to Secure!" In Multimedia Watermarking. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9803-6_2.
Full textKalker, Ton, and Mike Malkin. "Secure Quantization Index Modulation Watermark Detection." In Digital Watermarking. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_2.
Full textLemma, Aweke, Stefan Katzenbeisser, Mehmet Celik, and Michiel van der Veen. "Secure Watermark Embedding Through Partial Encryption." In Digital Watermarking. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_35.
Full textZhu, Yan, Dengguo Feng, and Wei Zou. "Collusion Secure Convolutional Spread Spectrum Fingerprinting." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_6.
Full textDoërr, Gwenaël, and Jean-Luc Dugelay. "Secure Video Watermarking via Embedding Strength Modulation." In Digital Watermarking. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_26.
Full textYu, Jeong Jae, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, and IL Hwan Park. "A Secure Steganographic Scheme against Statistical Analyses." In Digital Watermarking. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_40.
Full textWong, Angela S. L., Matthew Sorell, and Robert Clarke. "Secure Mutual Distrust Transaction Tracking Using Cryptographic Elements." In Digital Watermarking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_35.
Full textHe, HongJie, JiaShu Zhang, and Heng-Ming Tai. "A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication." In Digital Watermarking. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11922841_34.
Full textLiu, Zhongxuan, Shiguo Lian, Josselin Gautier, Ronggang Wang, Zhen Ren, and Haila Wang. "Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption." In Digital Watermarking. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92238-4_26.
Full textSingh, Amit Kumar, Basant Kumar, Ghanshyam Singh, and Anand Mohan. "Secure Multiple Watermarking Technique Using Neural Networks." In Medical Image Watermarking. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-57699-2_8.
Full textConference papers on the topic "SECURE WATERMARKING"
Amruth, S. Jaya, V. Sai Shruthik, and Sarada Jayan. "Secure Data Embedding using Fourier Transform-based Watermarking." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726146.
Full textTabrizchi, Sepehr, Shaahin Angizi, and Arman Roohi. "iSEW: in-Sensor Embedded Watermarking for Secure Imaging." In 2025 IEEE 33rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 2025. https://doi.org/10.1109/fccm62733.2025.00076.
Full textS, Mohandass, Dhanya S. T, Krishna Priya R, Kiruthiga M, and Siva P. M. "Deep Learning-based Brain Tumor Segmentation and Secure Watermarking." In 2025 International Conference on Computational Innovations and Engineering Sustainability (ICCIES). IEEE, 2025. https://doi.org/10.1109/iccies63851.2025.11032346.
Full textXin, Xiang, Honggang Wang, and Hua Fang. "SynthEcho Watermarking for Secure and Robust Image-to-Image Generation." In 2024 IEEE 44th International Conference on Distributed Computing Systems Workshops (ICDCSW). IEEE, 2024. http://dx.doi.org/10.1109/icdcsw63686.2024.00025.
Full textUluturk, Ceyda, Fidan Akdeniz, Melike Varol, and Wisam Elmasry. "Secure, Robust and Optimized Algorithm: Towards Enhancing Digital Image Watermarking." In 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP). IEEE, 2024. http://dx.doi.org/10.1109/idap64064.2024.10710930.
Full textK, Nandhini, and R. Rajkumar. "Secure and Reversible Medical Image Watermarking for E-Healthcare Applications." In 2025 6th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI). IEEE, 2025. https://doi.org/10.1109/icmcsi64620.2025.10883636.
Full textRaval, Mehul S., Priti P. Rege, and S. K. Parulkar. "Secure and robust watermarking technique." In TENCON 2012 - 2012 IEEE Region 10 Conference. IEEE, 2012. http://dx.doi.org/10.1109/tencon.2012.6412274.
Full textXie, Fuchun, Teddy Furon, and Caroline Fontaine. "Towards robust and secure watermarking." In the 12th ACM workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1854229.1854258.
Full textMehra, Neelesh, and Madhu Shandilya. "Dual watermarking scheme for secure buyer-seller watermarking protocol." In Fourth International Conference on Digital Image Processing (ICDIP 2012), edited by Mohamed Othman, Sukumar Senthilkumar, and Xie Yi. SPIE, 2012. http://dx.doi.org/10.1117/12.956459.
Full textLoo, P. "Digital watermarking with complex wavelets." In IEE Seminar on Secure Images and Image Authentication. IEE, 2000. http://dx.doi.org/10.1049/ic:20000221.
Full textReports on the topic "SECURE WATERMARKING"
Xie, Le. Secure Monitoring and Control of Solar Power Distribution System through Dynamic Watermarking. Office of Scientific and Technical Information (OSTI), 2024. https://doi.org/10.2172/2523662.
Full text