Cited by 14
A Copyright Protection using Watermarking Algorithm

2009 2nd International Congress on Image and Signal Processing
Lei Zhu, Linlin Zhao
Conference  (2009), p. 1
2009 International Conference on Wavelet Analysis and Pattern Recognition
Xiao-Wei Zhang, Lin-Lin Zhao, Zhi-Juan Weng
Conference  (2009), p. 298
2009 International Multimedia, Signal Processing and Communication Technologies
F. Hussain, E. Khan, O. Farooq
Conference  (2009), p. 280
2010 International Conference on Wavelet Analysis and Pattern Recognition
Xiong-Bo Zheng, Xiao-Wei Zhang
Conference  (2010), p. 260
2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)
Kumar Parasuraman, Deeparani G
Conference  (2014), p. 200
A Lightweight Multi-level Encryption Model for IoT Applications
M. Durairaj, K. Muthuramalingam
Book  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 17
A new buyer-seller watermarking protocol without double embedding
Peng Zeng, Zhen-fu Cao, Huang Lin
Journal  Journal of Shanghai Jiaotong University (Science) Volume 15, Issue 4 (2010), p. 397
Fingerprint Identification Using Hierarchical Matching and Topological Structures
Meryam Elmouhtadi, Sanaa El fkihi, Driss Aboutajdine
Book  Studies in Computational Intelligence (Advances in Soft Computing and Machine Learning in Image Processing) Volume 730 (2018), p. 393
Fingerprint Identification Using Hierarchical Matching and Topological Structures
M. Elmouhtadi, S. El fkihi, D. Aboutajdine
Book  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016) Volume 533 (2017), p. 714
Image Protection Against Forgery and Pixel Tampering Based on a Triple Hybrid Security Approach
Ahmad M. Nagm, Mohamed Torky, Mohammed Mahmoud Abo Ghazala, Hosam Eldin Fawzan Sayed
Book  Advances in Intelligent Systems and Computing (Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019) Volume 1058 (2020), p. 588
New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients
Makoto Fujimura, Tetsuya Takano, Satoshi Baba, Hideo Kuroda
Book  Communications in Computer and Information Science (Signal Processing and Multimedia) Volume 123 (2010), p. 156
Optimal Wavelet Coefficients Based Steganography for Image Security with Secret Sharing Cryptography Model
A. Sivasankari, S. Krishnaveni
Book  Advanced Sciences and Technologies for Security Applications (Cybersecurity and Secure Information Systems) (2019), p. 67
Robust and Imperceptible Watermarking of Video Streams for Low Power Devices
Muhammad Ishtiaq, M. Arfan Jaffar, Muhammad A. Khan, Zahoor Jan, Anwar M. Mirza
Book  Communications in Computer and Information Science (Signal Processing, Image Processing and Pattern Recognition) Volume 61 (2009), p. 177
Role of Blockchain and Watermarking Toward Cybersecurity
A. Dinesh Arokia Raj, Rupak Raj Jha, Mukeshkumar Yadav, Dahlia Sam, K. Jayanthi
Book  (2024), p. 103