Cited by 26
A Copyright Protection using Watermarking Algorithm

Xiao-Wei Zhang, Lin-Lin Zhao, Zhi-Juan Weng
Journal:  (2009), p. 298
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model
A. Sivasankari, S. Krishnaveni
Book:  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 67
Robust and Imperceptible Watermarking of Video Streams for Low Power Devices
Muhammad Ishtiaq, M. Arfan Jaffar, Muhammad A. Khan, Zahoor Jan, Anwar M. Mirza
Book:  Communications in Computer and Information Science (Signal Processing, Image Processing and Pattern Recognition) Volume 61 (2009), p. 177
Fingerprint Identification Using Hierarchical Matching and Topological Structures
M. Elmouhtadi, S. El fkihi, D. Aboutajdine
Book:  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016) Volume 533 (2017), p. 714
Image Protection Against Forgery and Pixel Tampering Based on a Triple Hybrid Security Approach
Ahmad M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed
Book:  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019) Volume 1058 (2020), p. 588
2009 International Multimedia, Signal Processing and Communication Technologies
F. Hussain, E. Khan, O. Farooq
Conference:  (2009), p. 280
2010 International Conference on Wavelet Analysis and Pattern Recognition
Xiong-Bo Zheng, Xiao-Wei Zhang
Conference:  (2010), p. 260
Fingerprint Identification Using Hierarchical Matching and Topological Structures
Meryam Elmouhtadi, Sanaa El fkihi, Driss Aboutajdine
Book:  Studies in Computational Intelligence (Advances in Soft Computing and Machine Learning in Image Processing) Volume 730 (2018), p. 393
New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients
Makoto Fujimura, Tetsuya Takano, Satoshi Baba, Hideo Kuroda
Book:  Communications in Computer and Information Science (Signal Processing and Multimedia) Volume 123 (2010), p. 156
2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)
Kumar Parasuraman, Deeparani G
Conference:  (2014), p. 200
A Lightweight Multi-level Encryption Model for IoT Applications
M. Durairaj, K. Muthuramalingam
Book:  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 17
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model
A. Sivasankari, S. Krishnaveni
Book:  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 67
2009 International Conference on Wavelet Analysis and Pattern Recognition
Xiao-Wei Zhang, Lin-Lin Zhao, Zhi-Juan Weng
Conference:  (2009), p. 298
2009 2nd International Congress on Image and Signal Processing
Lei Zhu, Linlin Zhao
Conference:  (2009), p. 1
Robust and Imperceptible Watermarking of Video Streams for Low Power Devices
Muhammad Ishtiaq, M. Arfan Jaffar, Muhammad A. Khan, Zahoor Jan, Anwar M. Mirza
Book:  Communications in Computer and Information Science (Signal Processing, Image Processing and Pattern Recognition) Volume 61 (2009), p. 177
Fingerprint Identification Using Hierarchical Matching and Topological Structures
M. Elmouhtadi, S. El fkihi, D. Aboutajdine
Book:  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016) Volume 533 (2017), p. 714
Image Protection Against Forgery and Pixel Tampering Based on a Triple Hybrid Security Approach
Ahmad M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed
Book:  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019) Volume 1058 (2020), p. 588
2009 International Multimedia, Signal Processing and Communication Technologies
F. Hussain, E. Khan, O. Farooq
Conference:  (2009), p. 280
2010 International Conference on Wavelet Analysis and Pattern Recognition
Xiong-Bo Zheng, Xiao-Wei Zhang
Conference:  (2010), p. 260
Fingerprint Identification Using Hierarchical Matching and Topological Structures
Meryam Elmouhtadi, Sanaa El fkihi, Driss Aboutajdine
Book:  Studies in Computational Intelligence (Advances in Soft Computing and Machine Learning in Image Processing) Volume 730 (2018), p. 393
New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients
Makoto Fujimura, Tetsuya Takano, Satoshi Baba, Hideo Kuroda
Book:  Communications in Computer and Information Science (Signal Processing and Multimedia) Volume 123 (2010), p. 156
2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)
Kumar Parasuraman, Deeparani G
Conference:  (2014), p. 200
A Lightweight Multi-level Encryption Model for IoT Applications
M. Durairaj, K. Muthuramalingam
Book:  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 17
2009 2nd International Congress on Image and Signal Processing
Lei Zhu, Linlin Zhao
Conference:  (2009), p. 1
A new buyer-seller watermarking protocol without double embedding
Peng Zeng, Zhen-fu Cao, Huang Lin
Journal:  Journal of Shanghai Jiaotong University (Science) Volume 15, Issue 4 (2010), p. 397
A new buyer-seller watermarking protocol without double embedding
Peng Zeng, Zhen-fu Cao, Huang Lin
Journal:  Journal of Shanghai Jiaotong University (Science) Volume 15, Issue 4 (2010), p. 397