Search Results

There are 7852 results for: content related to: Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet

  1. A survey on reversible watermarking techniques for relational databases

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2580–2603, Saman Iftikhar, M. Kamran and Zahid Anwar

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1196

  2. A hybrid digital image watermarking algorithm based on DCT-DWT and auto-thresholding

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4373–4395, Nasr addin Ahmed Salem Al-maweri, Wan Azizun Wan Adnan, Abd Rahman Ramli, Khairulmizam Samsudin and Sharifah Mumtazah Syed Ahmad

    Version of Record online : 5 OCT 2015, DOI: 10.1002/sec.1371

  3. An integrated detection system against false data injection attacks in the Smart Grid

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 91–109, Wei Yu, David Griffith, Linqiang Ge, Sulabh Bhattarai and Nada Golmie

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.957

  4. A two-step watermarking attack using long-range correlation image restoration

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 625–635, Amir H. Taherinia and Mansour Jamzad

    Version of Record online : 16 AUG 2011, DOI: 10.1002/sec.357

  5. Digital Watermarking

    Standard Article

    Encyclopedia of Imaging Science and Technology

    R. Chandramouli, Nasir Memon and Majid Rabbani

    Published Online : 15 JAN 2002, DOI: 10.1002/0471443395.img010

  6. Biometric watermarks based on face recognition methods for authentication of digital images

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1672–1687, Wioletta Wójtowicz and Marek R. Ogiela

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1114

  7. Robust track-and-trace video watermarking

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 353–363, Lei Yang, Qian Chen, Jun Tian and Dapeng Wu

    Version of Record online : 30 MAR 2011, DOI: 10.1002/sec.319

  8. A blind chaos-based watermarking technique

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 800–811, Mohammad Ghebleh, Ali Kanso and Hala S. Own

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.783

  9. Adaptive-capacity and robust natural language watermarking for agglutinative languages

    Security and Communication Networks

    Volume 5, Issue 3, March 2012, Pages: 301–310, Mi-Young Kim and Randy Goebel

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.336

  10. Blind detection of spread spectrum flow watermarks

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 257–274, Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Dong Xuan and Wei Yu

    Version of Record online : 17 MAY 2012, DOI: 10.1002/sec.540

  11. A high capacity data hiding algorithm for H.264/AVC video

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2947–2955, Mehdi Fallahpour, Shervin Shirmohammadi and Mohammad Ghanbari

    Version of Record online : 17 MAR 2015, DOI: 10.1002/sec.1221

  12. Multi-bit watermarking of high dynamic range images based on perceptual models

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 705–720, Emanuele Maiorana and Patrizio Campisi

    Version of Record online : 16 SEP 2015, DOI: 10.1002/sec.1345

  13. A reversible watermark scheme for 2D vector map based on reversible contrast mapping

    Security and Communication Networks

    Volume 6, Issue 9, September 2013, Pages: 1117–1125, Peng Fei, Chen Li and Long Min

    Version of Record online : 10 DEC 2012, DOI: 10.1002/sec.680

  14. 3D Object Watermarking

    3D Object Processing: Compression, Indexing and Watermarking

    Jihane Bennour, Jean-Luc Dugelay, Emmanuel Garcia, Nikos Nikolaidis, Pages: 139–183, 2008

    Published Online : 23 APR 2008, DOI: 10.1002/9780470510773.ch4

  15. On multiwatermarking in cloud environment

    Concurrency and Computation: Practice and Experience

    Volume 24, Issue 17, 10 December 2012, Pages: 2151–2164, Jinwei Wang and Shiguo Lian

    Version of Record online : 16 SEP 2011, DOI: 10.1002/cpe.1820

  16. A novel watermarking method for software protection in the cloud

    Software: Practice and Experience

    Volume 42, Issue 4, April 2012, Pages: 409–430, Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo Lian and Athanasios V. Vasilakos

    Version of Record online : 23 MAY 2011, DOI: 10.1002/spe.1088

  17. Watermarking in halftone images with noise balance strategy

    International Journal of Imaging Systems and Technology

    Volume 20, Issue 3, September 2010, Pages: 202–214, Jing-Ming Guo, Soo-Chang Pei and Hua Lee

    Version of Record online : 16 AUG 2010, DOI: 10.1002/ima.20239

  18. New scheme of digital watermarking using an adaptive embedding strength applied on multiresolution filed by 9/7 wavelet

    International Journal of Imaging Systems and Technology

    Volume 16, Issue 6, 2006, Pages: 249–257, Fahmi Kammoun, Ali Khalfallah and Mohamed Salim Bouhlel

    Version of Record online : 16 APR 2007, DOI: 10.1002/ima.20088

  19. A digital watermarking scheme that preserves image quality and is applicable to watermark sequences from a variety of distributions

    Systems and Computers in Japan

    Volume 37, Issue 8, July 2006, Pages: 90–100, Takashi Tachibana, Masaaki Fujiyoshi and Hitoshi Kiya

    Version of Record online : 16 MAY 2006, DOI: 10.1002/scj.20257

  20. Block-based watermarking for color images using visibility of quantization noise

    International Journal of Imaging Systems and Technology

    Volume 20, Issue 2, June 2010, Pages: 179–189, Kuo-Cheng Liu

    Version of Record online : 18 MAY 2010, DOI: 10.1002/ima.20234