Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi …

BB Zaidan, AA Zaidan - Journal of Circuits, Systems and Computers, 2017 - World Scientific
Evaluating and benchmarking software and hardware field programmable gate array
(FPGA)-based digital watermarking are considered challenging tasks because of multiple …

A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on 'large‐scale data'

BB Zaidan, AA Zaidan, HA Karim… - Software: Practice and …, 2017 - Wiley Online Library
Digital watermarking evaluation and benchmarking are challenging tasks because of
multiple evaluation and conflicting criteria. A few approaches have been presented to …

A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques

BB Zaidan, AA Zaidan, HA Karim… - International Journal of …, 2024 - World Scientific
This paper presents a new approach based on multi-dimensional evaluation and
benchmarking for data hiding techniques, ie, watermarking and steganography. The novelty …

[PDF][PDF] Survey and analysis of hardware cryptographic and steganographic systems on FPGA

S Rajagopalan, R Amirtharajan… - Journal of Applied …, 2012 - researchgate.net
Little brooks make great rivers-says a proverb. Information science involves not only the
efforts made for gathering, acquiring or collecting the data that corresponds to the …

Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations

KD Michaylov, DK Sarmah - Journal of Cyber Security Technology, 2024 - Taylor & Francis
Image steganography and steganalysis, which involve concealing and uncovering hidden
data within images, have gained significant attention in recent years, finding applications in …

Notice of Removal: Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography

S Chandran, K Bhattacharyya - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Notice of Removal: Performance analysis of LSB, DCT, and DWT for digital watermarking
application using steganography | IEEE Conference Publication | IEEE Xplore Notice of …

Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking

ESM El-Kenawy, N Khodadadi, A Khoshnaw… - Applied Sciences, 2022 - mdpi.com
Recently, piracy and copyright violations of digital content have become major concerns as
computer science has advanced. In order to prevent unauthorized usage of content, digital …

[PDF][PDF] Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications.

M Alenezi, M Nadeem, A Agrawal, R Kumar… - International Journal of …, 2020 - inass.org
Security and design tactics estimation of web application for ensuring the security, efficiency
and design tactics of web applications is necessary. A survey conducted by the security …

A computing coordination based fuzzy group decision-making (CC-FGDM) for web service oriented architecture

MJ Tsai, CS Wang - Expert Systems with Applications, 2008 - Elsevier
As the demands for faster data processing and enterprise computing are increasing, the
traditional client/server architecture has gradually been replaced by Grid computing or the …

ATHENa-automated tool for hardware evaluation: Toward fair and comprehensive benchmarking of cryptographic hardware using FPGAs

K Gaj, JP Kaps, V Amirineni… - … Conference on Field …, 2010 - ieeexplore.ieee.org
A fair comparison of functionally equivalent digital system designs targeting FPGAs is a
challenging and time consuming task. The results of the comparison depend on the inherent …