Sciweavers

384 search results - page 25 / 77
» A Survey of Watermarking Security
Sort
View
JDCTA
2010
125views more  JDCTA 2010»
13 years 2 months ago
Safety technologies impacts survey in M-services security provision
Nowadays, Effectiveness and benefits of mobile phone technologies appeared more than expected. During the recent decade, using of mobile phone improved from telephone call tools t...
Fatemeh NasserEslami, Fatemeh Saghafi
ICIP
2008
IEEE
14 years 9 months ago
Principal Component Analysis of spectral coefficients for mesh watermarking
This paper proposes a new robust 3-D object blind watermarking method using constraints in the spectral domain. Mesh watermarking in spectral domain has the property of spreading ...
Ming Luo, Adrian G. Bors
IJIT
2004
13 years 9 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
IDTRUST
2009
ACM
14 years 2 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper