[BOOK][B] Watermarking systems engineering: enabling digital assets security and other applications
M Barni, F Bartolini - 2004 - taylorfrancis.com
The growth of the Internet has fueled the demand for enhanced watermarking and data
hiding technologies and has stimulated research into new ways to implement watermarking …
hiding technologies and has stimulated research into new ways to implement watermarking …
[PDF][PDF] A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters
X Wu, J Hu, Z Gu, J Huang - … and Practice in …, 2005 - crpit.scem.westernsydney.edu.au
Semi-fragile watermark fragile to malicious modifications while robust to incidental
manipulations is drawing many attentions in image authentication. However, watermark …
manipulations is drawing many attentions in image authentication. However, watermark …
Wavelet based image authentication and recovery
In this paper, we propose a secure semi-fragile watermarking technique based on integer
wavelet transform with a choice of two watermarks to be embedded. A self-recovering …
wavelet transform with a choice of two watermarks to be embedded. A self-recovering …
Protection of wavelet-based watermarking systems using filter parametrization
We discuss wavelet filter parametrization as a means to add security to wavelet-based
watermarking schemes. It turns out that our proposed scheme is resistant to unauthorized …
watermarking schemes. It turns out that our proposed scheme is resistant to unauthorized …
[PDF][PDF] A quick glance at digital watermarking in medical images
Digital watermarking is seen as a necessary and important field to be developed since the
attacks and manipulations of digital documents and media are actively done. This paper …
attacks and manipulations of digital documents and media are actively done. This paper …
Watermark security via secret wavelet packet subband structures
W Dietl, A Uhl - IFIP International Conference on Communications and …, 2003 - Springer
Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We
use the vast amount of possible wavelet packet decomposition structures to create a secret …
use the vast amount of possible wavelet packet decomposition structures to create a secret …
Analysis of a wavelet-based robust hash algorithm
A Meixner, A Uhl - Security, Steganography, and Watermarking …, 2004 - spiedigitallibrary.org
This paper paper is a quantitative evaluation of a wavelet-based, robust authentication
hashing algorithm. Based on the results of a series of robustness and tampering sensitivity …
hashing algorithm. Based on the results of a series of robustness and tampering sensitivity …
[PDF][PDF] Improving energy compaction of a wavelet transform using genetic algorithm and fast neural network
J Stolarek - Archives of Control Sciences, 2010 - bibliotekanauki.pl
In this paper a new method for adaptive synthesis of a smooth orthogonal wavelet, using fast
neural network and genetic algorithm, is introduced. Orthogonal lattice structure is …
neural network and genetic algorithm, is introduced. Orthogonal lattice structure is …
Localization watermarking for authentication of text images in Quran with spiral manner numbering
The phenomenon of widespread usage of smart phone has encouraged many android
applications to be produced, by free or paid. Nowadays, with the trend of communicating …
applications to be produced, by free or paid. Nowadays, with the trend of communicating …
Digital watermarking for recovering attack areas of medical images using spiral numbering
Medical image is seen as one of crucial data that demand for authentication method in order
to ensure that data has not been tampered. This paper has conducted a research proposing …
to ensure that data has not been tampered. This paper has conducted a research proposing …