[BOOK][B] Watermarking systems engineering: enabling digital assets security and other applications

M Barni, F Bartolini - 2004 - taylorfrancis.com
The growth of the Internet has fueled the demand for enhanced watermarking and data
hiding technologies and has stimulated research into new ways to implement watermarking …

[PDF][PDF] A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters

X Wu, J Hu, Z Gu, J Huang - … and Practice in …, 2005 - crpit.scem.westernsydney.edu.au
Semi-fragile watermark fragile to malicious modifications while robust to incidental
manipulations is drawing many attentions in image authentication. However, watermark …

Wavelet based image authentication and recovery

R Chamlawi, A Khan, A Idris - Journal of Computer Science and …, 2007 - Springer
In this paper, we propose a secure semi-fragile watermarking technique based on integer
wavelet transform with a choice of two watermarks to be embedded. A self-recovering …

Protection of wavelet-based watermarking systems using filter parametrization

W Dietl, P Meerwald, A Uhl - Signal Processing, 2003 - Elsevier
We discuss wavelet filter parametrization as a means to add security to wavelet-based
watermarking schemes. It turns out that our proposed scheme is resistant to unauthorized …

[PDF][PDF] A quick glance at digital watermarking in medical images

SI Hisham, S Liew, J Zain - Biomedical Engineering Research, 2013 - umpir.ump.edu.my
Digital watermarking is seen as a necessary and important field to be developed since the
attacks and manipulations of digital documents and media are actively done. This paper …

Watermark security via secret wavelet packet subband structures

W Dietl, A Uhl - IFIP International Conference on Communications and …, 2003 - Springer
Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We
use the vast amount of possible wavelet packet decomposition structures to create a secret …

Analysis of a wavelet-based robust hash algorithm

A Meixner, A Uhl - Security, Steganography, and Watermarking …, 2004 - spiedigitallibrary.org
This paper paper is a quantitative evaluation of a wavelet-based, robust authentication
hashing algorithm. Based on the results of a series of robustness and tampering sensitivity …

[PDF][PDF] Improving energy compaction of a wavelet transform using genetic algorithm and fast neural network

J Stolarek - Archives of Control Sciences, 2010 - bibliotekanauki.pl
In this paper a new method for adaptive synthesis of a smooth orthogonal wavelet, using fast
neural network and genetic algorithm, is introduced. Orthogonal lattice structure is …

Localization watermarking for authentication of text images in Quran with spiral manner numbering

SI Hisham, AN Muhammad, JM Zain… - … on Advances in …, 2013 - ieeexplore.ieee.org
The phenomenon of widespread usage of smart phone has encouraged many android
applications to be produced, by free or paid. Nowadays, with the trend of communicating …

Digital watermarking for recovering attack areas of medical images using spiral numbering

SI Hisham, AN Muhammad, JM Zain… - 2013 International …, 2013 - ieeexplore.ieee.org
Medical image is seen as one of crucial data that demand for authentication method in order
to ensure that data has not been tampered. This paper has conducted a research proposing …