Cited by 14
A Copyright Protection using Watermarking Algorithm

2009 International Conference on Wavelet Analysis and Pattern Recognition
Xiao-Wei Zhang, Lin-Lin Zhao, Zhi-Juan Weng
Conference:  (2009), p. 298
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model
A. Sivasankari, S. Krishnaveni
Book:  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 67
A Lightweight Multi-level Encryption Model for IoT Applications
M. Durairaj, K. Muthuramalingam
Book:  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 17
2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)
Kumar Parasuraman, Deeparani G
Conference:  (2014), p. 200
New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients
Makoto Fujimura, Tetsuya Takano, Satoshi Baba, Hideo Kuroda
Book:  Communications in Computer and Information Science (Signal Processing and Multimedia) Volume 123 (2010), p. 156
Fingerprint Identification Using Hierarchical Matching and Topological Structures
Meryam Elmouhtadi, Sanaa El fkihi, Driss Aboutajdine
Book:  Studies in Computational Intelligence (Advances in Soft Computing and Machine Learning in Image Processing) Volume 730 (2018), p. 393
2010 International Conference on Wavelet Analysis and Pattern Recognition
Xiong-Bo Zheng, Xiao-Wei Zhang
Conference:  (2010), p. 260
2009 International Multimedia, Signal Processing and Communication Technologies
F. Hussain, E. Khan, O. Farooq
Conference:  (2009), p. 280
Image Protection Against Forgery and Pixel Tampering Based on a Triple Hybrid Security Approach
Ahmad M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed
Book:  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019) Volume 1058 (2020), p. 588
Fingerprint Identification Using Hierarchical Matching and Topological Structures
M. Elmouhtadi, S. El fkihi, D. Aboutajdine
Book:  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016) Volume 533 (2017), p. 714
Robust and Imperceptible Watermarking of Video Streams for Low Power Devices
Muhammad Ishtiaq, M. Arfan Jaffar, Muhammad A. Khan, Zahoor Jan, Anwar M. Mirza
Book:  Communications in Computer and Information Science (Signal Processing, Image Processing and Pattern Recognition) Volume 61 (2009), p. 177
2009 2nd International Congress on Image and Signal Processing
Lei Zhu, Linlin Zhao
Conference:  (2009), p. 1
Role of Blockchain and Watermarking Toward Cybersecurity
A. Dinesh Arokia Raj, Rupak Raj Jha, Mukeshkumar Yadav, Dahlia Sam, K. Jayanthi
Book:  (2024), p. 103
A new buyer-seller watermarking protocol without double embedding
Peng Zeng, Zhen-fu Cao, Huang Lin
Journal:  Journal of Shanghai Jiaotong University (Science) Volume 15, Issue 4 (2010), p. 397