A transform domain based robust color image watermarking scheme for single and dual attacks

NN Hurrah, NA Loan, SA Parah… - … Conference on Image …, 2017 - ieeexplore.ieee.org
This paper proposes an efficient watermarking scheme based on hybrid transform domain.
The watermarking scheme is blind, robust and secure. The scheme has been developed to …

Reversible data embedding scheme in encrypted image using Arnold transform for satellite images

S Rohith, MR Mahesh, GM Basavaraj… - 2022 IEEE North …, 2022 - ieeexplore.ieee.org
An Satellite images are transmitted through the network undergoes security issues, losses in
data and high confidentiality which concern the authenticity, integrity and security. In this …

Digital Watermarking Hiding Technology for Copyright Information

Y Chen, X Hu, F **ao - Data Processing Techniques and Applications for …, 2020 - Springer
With the wide application of information technology and the gradual development of army
informationization construction, especially with the development of computer network …

System and method for application of enhanced controls with a genomic computing platform

RJ Bovee, NB Greenfield - US Patent App. 16/600,226, 2020 - Google Patents
A system and method for genomic sample processing in a computing system using an
enhanced spike-in that includes specifying a genetic control sequence; registering the …

Semi-blind Watermarking via Laser Engraving Attacked

X Gu, B Qian, L Yu, Y Fu - 2019 18th International Symposium …, 2019 - ieeexplore.ieee.org
An Image Watermarking is used to identify the ownership, with the copyright information
hiding inside a digital image. In this paper, a robust and secure digital grey image scheme is …

[PDF][PDF] Highly Efficient Copyright Protection Algorithm for Satellite Imagery Using Turbo Product Codes

S AlMaeeni, A Kunhu, H Al-Ahmad - IJCSNS, 2019 - researchgate.net
Satellite imagery has been used in many applications and fields of research. This paper
proposes a novel algorithm used in embedding a serial key information into satellites …

Watermark redundancy using sudoku

SK Ahmad Khalid - 2018 - eprints.uthm.edu.my
In today's world, designer of a watermarking system had to constantly faced with determined
attacks to remove copyright information from a watermarked cover image. Due to these …

[PDF][PDF] Analysis of Vulnerability of Keys in a Watermarking System for Attack Susceptibility: Vulnerability of Keys in a Watermarking System

W Rehman, A Khan, B Ahmad - Proceedings of the Pakistan Academy of …, 2017 - paspk.org
Recent research brought up numerous techniques for copyright protection and tamper
proofing of relational databases along with proof of robustness, etc. However, these …

[CITATION][C] The CNN approach for the lung cancer detection in Image Processing: A Review

SKN Junaidi - Frontier Advances in Applied Science and Engineering, 2023