Security and privacy protection in visual sensor networks: A survey
Visual sensor networks (VSNs) are receiving a lot of attention in research, and at the same
time, commercial applications are starting to emerge. VSN devices come with image …
time, commercial applications are starting to emerge. VSN devices come with image …
[PDF][PDF] Digital watermarking: A tutorial review
SP Mohanty - URL: http://www. csee. usf. edu/~ smohanty/research …, 1999 - Citeseer
The growth of high speed computer networks and that of Internet, in particular, has explored
means of new business, scientific, entertainment, and social opportunities. Ironically, the …
means of new business, scientific, entertainment, and social opportunities. Ironically, the …
[책][B] Management information systems: Managing the digital firm
KC Laudon, JP Laudon - 2004 - books.google.com
Information systems knowledge is essential for creating competitive firms, managing global
corporations, and providing useful products and services to customers. This book introduces …
corporations, and providing useful products and services to customers. This book introduces …
Enhancing security and privacy in biometrics-based authentication systems
Because biometrics-based authentication offers several advantages over other
authentication methods, there has been a significant surge in the use of biometrics for user …
authentication methods, there has been a significant surge in the use of biometrics for user …
Value-based requirements engineering: exploring innovative e-commerce ideas
Innovative e-commerce ideas are characterised by commercial products yet unknown to the
market, enabled by information technology such as the Internet and technologies on top of it …
market, enabled by information technology such as the Internet and technologies on top of it …
Cyber warfare: steganography vs. steganalysis
H Wang, S Wang - Communications of the ACM, 2004 - dl.acm.org
Cyber warfare Page 1 76 October 2004/Vol. 47, No. 10 COMMUNICATIONS OF THE ACM
The rise of the Internet and multime- dia techniques in the mid-1990s has prompted increasing …
The rise of the Internet and multime- dia techniques in the mid-1990s has prompted increasing …
Secret and public key image watermarking schemes for image authentication and ownership verification
PW Wong, N Memon - IEEE transactions on image processing, 2001 - ieeexplore.ieee.org
We describe a watermarking scheme for ownership verification and authentication.
Depending on the desire of the user, the watermark can be either visible or invisible. The …
Depending on the desire of the user, the watermark can be either visible or invisible. The …
Blockchain-enabled accountability mechanism against information leakage in vertical industry services
The emergence of 5 G technology contributes to create more open and efficient eco-systems
for various vertical industries. Especially, it significantly improves the capabilities of the …
for various vertical industries. Especially, it significantly improves the capabilities of the …
A public key watermark for image verification and authentication
PW Wong - … 1998 international conference on image processing …, 1998 - ieeexplore.ieee.org
We propose a public key watermarking algorithm for image integrity verification. This
watermark is capable of detecting any change made to an image, including changes in pixel …
watermark is capable of detecting any change made to an image, including changes in pixel …
A buyer-seller watermarking protocol
N Memon, PW Wong - IEEE Transactions on image processing, 2001 - ieeexplore.ieee.org
Digital watermarks have previously been proposed for the purposes of copy protection and
copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts …
copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts …