An MD5-Hirose Hashing Algorithm for Digital Image Watermarking
暂无分享,去创建一个
[1] Yongdong Wu,et al. On the security of an SVD-based ownership watermarking , 2005, IEEE Transactions on Multimedia.
[2] Dutch T. Meyer,et al. A study of practical deduplication , 2011, TOS.
[3] M. A. Peer,et al. A channel wise color image watermarking scheme based on Discrete Wavelet Transformation , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).
[4] Naoufel Werghi,et al. Robust and Fragile Watermarking Scheme Based on DCT and Hash Function for Color Satellite Images , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.
[5] Catherine H. Gebotys,et al. A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security , 2013, IEEE Transactions on Aerospace and Electronic Systems.
[6] A. K. Singh,et al. A novel technique for digital image watermarking in spatial domain , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[7] Kusuma Kumari. A Survey of Digital Watermarking Techniques and its Applications , 2013 .
[8] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[9] Ainuddin Wahid Abdul Wahab,et al. Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network , 2015, J. King Saud Univ. Comput. Inf. Sci..
[10] Frank Y. Shih,et al. An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..
[11] Amiruddin Amiruddin,et al. New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks , 2017, Int. J. Commun. Networks Inf. Secur..
[12] Jianhua Sun,et al. Image Algorithm for Watermarking Relational Databases Based on Chaos , 2010 .
[13] Chun Kiat Tan,et al. Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability , 2011, Journal of Digital Imaging.
[14] Tian-ge Zhuang,et al. A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.
[15] Zhenjun Tang,et al. Robust image hashing using ring-based entropies , 2013, Signal Process..
[16] Palash Jain,et al. A SURVEY ON INTERNET OF THINGS: SECURITY AND PRIVACY ISSUES , 2015 .
[17] Yudi Prayudi,et al. Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy , 2016 .
[18] Yuan Zhang,et al. A Medical Image Authentication System Based on Reversible Digital Watermarking , 2009, 2009 First International Conference on Information Science and Engineering.
[19] Vishal Shrivastava,et al. A Survey of Digital Watermarking Techniques and its Applications , 2014, ArXiv.
[20] Preeti Nagrath,et al. Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm , 2013 .
[21] A. Kousalya,et al. A Comparative Analysis of Security Algorithms Using Cryptographic Techniques in Cloud Computing , 2017 .
[22] Agostino Cortesi,et al. Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010, J. Univers. Comput. Sci..
[23] Jian-Ping Huang. A Fast Watermarking Algorithm for Image Authentication , 2008, 2008 International Conference on Cyberworlds.
[24] Anil Gupta,et al. Lsb Based Digital Image Watermarking For Gray Scale Image , 2012 .
[25] Jaspal Bagga,et al. Performance Comparison of Digital Image Watermarking Techniques: A Survey , 2013 .
[26] H. Hassan,et al. Investigation on perceptual and robustness of LSB digital watermarking scheme on Halal Logo authentication , 2012, 2012 International Conference on System Engineering and Technology (ICSET).
[27] Kiran,et al. Digital Watermarking : Potential Challenges and Issues , 2015 .
[28] M. Mohammed Sathik,et al. A Novel DWT Based Invisible Watermarking Technique for Digital Images , 2012, Int. Arab. J. e Technol..
[29] Dr.S.S. Sane,et al. A Study of Watermarking Relational Databases Miss , 2014 .
[30] Risanuri Hidayat,et al. Increasing the security of mp3 steganography using AES Encryption and MD5 hash function , 2016, 2016 2nd International Conference on Science and Technology-Computer (ICST).
[31] Ganga Holi,et al. An Overview of Image Security Techniques , 2016 .
[32] K. Baskaran,et al. FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm , 2012 .
[33] Mohamed M. Abd-Eldayem. A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine , 2013 .
[34] Pallavi Patil,et al. DWT Based Invisible Watermarking Technique for Digital Images , 2013 .
[35] Wang Xi-jin,et al. The Application Research of MD5 Encryption Algorithm in DCT Digital Watermarking , 2012 .
[36] Takaaki Yamada,et al. Use of both Invisible and Emergable Watermarks to Deter Illegal Copying of Images , 2013, KES.
[37] Wim Schoenmaker,et al. Simulation of substrate currents , 2002, International Conferencre on Simulation of Semiconductor Processes and Devices.
[38] Lokesh Singh,et al. An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy , 2016 .
[39] Shakil Ahmed,et al. Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform , 2013 .
[40] Preeti Gupta. Cryptography based digital image watermarking algorithm to increase security of watermark data , 2012 .
[41] Y. Ciftci,et al. The first principles study on the TmSb compound , 2011 .
[42] Amjad Rehman,et al. Digital Watermarking for Images Security using Discrete Slantlet Transform , 2014 .