Wavelet based image watermarking: futuristic concepts in information security

AK Singh, M Dave, A Mohan - Proceedings of the National Academy of …, 2014 - Springer
In this paper, we have reviewed the state-of-art of the various wavelet based image
watermarking techniques in spatial as well as in transform domain based on the robustness …

Medical image watermarking for ownership & tamper detection

HS Alshanbari - Multimedia tools and applications, 2021 - Springer
Image watermarking can provide ownership identification as well as tamper protection.
Transform domain based image watermarking has been proven to be more robust than the …

Circularly symmetric watermark embedding in 2-D DFT domain

V Solachidis, L Pitas - IEEE transactions on image processing, 2001 - ieeexplore.ieee.org
In this paper, a method for digital image watermarking is described that is resistant to
geometric transformations. A private key, which allows a very large number of watermarks …

DCT-based image watermarking using subsampling

WC Chu - IEEE transactions on multimedia, 2003 - ieeexplore.ieee.org
DCT-based image watermarking using subsampling Page 1 34 IEEE TRANSACTIONS ON
MULTIMEDIA, VOL. 5, NO. 1, MARCH 2003 DCT-Based Image Watermarking Using …

Hiding digital watermarks using multiresolution wavelet transform

MS Hsieh, DC Tseng, YH Huang - IEEE Transactions on …, 2001 - ieeexplore.ieee.org
In this paper, an image accreditation technique by embedding digital watermarks in images
is proposed. The proposed method for the digital watermarking is based on the wavelet …

Wavelet tree quantization for copyright protection watermarking

SH Wang, YP Lin - IEEE transactions on image processing, 2004 - ieeexplore.ieee.org
This paper proposes a wavelet-tree-based blind watermarking scheme for copyright
protection. The wavelet coefficients of the host image are grouped into so-called super trees …

Survey of wavelet-domain watermarking algorithms

P Meerwald, A Uhl - Security and watermarking of multimedia …, 2001 - spiedigitallibrary.org
In this paper, we will provide an overview of the wavelet-based watermarking techniques
available today. We will see how previously proposed methods such as spread-spectrum …

An efficient watermarking method based on significant difference of wavelet coefficient quantization

WH Lin, SJ Horng, TW Kao, P Fan… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper proposes a blind watermarking algorithm based on the significant difference of
wavelet coefficient quantization for copyright protection. Every seven nonoverlap wavelet …

Advanced wireless networks: 4G technologies

S Glisic, JP Makela - 2006 IEEE Ninth International Symposium …, 2006 - ieeexplore.ieee.org
Within the wide range of issues related to 4G wireless networks, due to the scope of the
ISSTA conference, in this presentation we highlight some segments of wireless networks …

Euphony: Harmonious unification of cacophonous anti-virus vendor labels for android malware

M Hurier, G Suarez-Tangil, SK Dash… - 2017 IEEE/ACM 14th …, 2017 - ieeexplore.ieee.org
Android malware is now pervasive and evolving rapidly. Thousands of malware samples are
discovered every day with new models of attacks. The growth of these threats has come …