Blind semi-fragile watermarking scheme for video authentication in video surveillance context

A Hammami, A Ben Hamida, C Ben Amar - Multimedia Tools and …, 2021 - Springer
With the development of advanced multimedia editing tools, numerous unauthorized
manipulations are easily doable to surveillance systems video files. Thus, video tamper …

Steganography of encrypted messages inside valid QR codes

M Alajmi, I Elashry, HS El-Sayed, OSF Allah - IEEE Access, 2020 - ieeexplore.ieee.org
Steganography is considered the first line of defense in information security as it hides a
secret message (payload) inside an innocent looking file (container) to transfer the payload …

Mamdani FIS Combined With LU Decomposition Method and Two-Level LWT for Image Watermarking Technique

RI Sabri, AM Abduldaim… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
Fuzzy theory and linear algebra have a substantial role in various sciences and the biggest
effect was in the share of computer science. In the field of image processing, the process of …

Reversible video steganography using quick response codes and modified elgamal cryptosystem

R Mstafa - Computers, Materials & Continua, CMC, 2022 - papers.ssrn.com
The rapid transmission of multimedia information has been achieved mainly by recent
advancements in the Internet's speed and information technology. In spite of this …

Anaglyph video smell presentation using micro-porous piezoelectric film olfactory display

SH Abid, Z Li, R Li, J Waleed - Displays, 2015 - Elsevier
Anaglyph video (ie, 3D video) is a recent trend in movies and multimedia; the method has
also been recently developed for conversion of such videos from traditional 2D screens or …

Comprehensive display of digital image copy-move forensics techniques

J Waleed, DA Abdullah… - … Technology and their …, 2018 - ieeexplore.ieee.org
Digital Images considered as a natural and effective communication media to the human,
owing to the swiftly and the easy manner to comprehend their content. After the appearing of …

An efficient and fast digital image copy-move forensic technique

MH Khudhur, J Waleed, H Hatem… - … and Sciences of Al …, 2018 - ieeexplore.ieee.org
Digital images consider as an active and natural media for carrying worth information over
the world. With the release of high-resolution digital cameras, PCs, and developed photo …

QR Code-based Digital Watermarking For Protecting Personal Information On CT-Scan Images

MI Ripandi, AI Hadiana… - 2024 11th International …, 2024 - ieeexplore.ieee.org
In the current digital era, the rapid exchange and transmission of medical images,
particularly CT-Scan images, have heightened concerns about data security and privacy …

Smart Retailing: A Novel Approach for Retailing Business

G Parmar - Big Data Analytics, 2022 - taylorfrancis.com
This chapter provides, first, the brief of retailing with its definition and its types for
understanding the retailing process. Then after that, the chapter contains different aspects …

Algebraic Authentication Scheme

AM Abduldaim, J Waleed… - 2017 Second Al …, 2017 - ieeexplore.ieee.org
A zero knowledge proof is a type of authentication scheme, which gives no knowledge
beyond the authenticity for identifying an entity. Ring theory plays an important role in …