BB Zaidan, AA Zaidan, HA Karim… - Software: Practice and …, 2017 - Wiley Online Library
Digital watermarking evaluation and benchmarking are challenging tasks because of multiple evaluation and conflicting criteria. A few approaches have been presented to …
BB Zaidan, AA Zaidan, HA Karim… - International Journal of …, 2024 - World Scientific
This paper presents a new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques, ie, watermarking and steganography. The novelty …
Little brooks make great rivers-says a proverb. Information science involves not only the efforts made for gathering, acquiring or collecting the data that corresponds to the …
KD Michaylov, DK Sarmah - Journal of Cyber Security Technology, 2024 - Taylor & Francis
Image steganography and steganalysis, which involve concealing and uncovering hidden data within images, have gained significant attention in recent years, finding applications in …
Notice of Removal: Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography | IEEE Conference Publication | IEEE Xplore Notice of …
Recently, piracy and copyright violations of digital content have become major concerns as computer science has advanced. In order to prevent unauthorized usage of content, digital …
Security and design tactics estimation of web application for ensuring the security, efficiency and design tactics of web applications is necessary. A survey conducted by the security …
MJ Tsai, CS Wang - Expert Systems with Applications, 2008 - Elsevier
As the demands for faster data processing and enterprise computing are increasing, the traditional client/server architecture has gradually been replaced by Grid computing or the …
K Gaj, JP Kaps, V Amirineni… - … Conference on Field …, 2010 - ieeexplore.ieee.org
A fair comparison of functionally equivalent digital system designs targeting FPGAs is a challenging and time consuming task. The results of the comparison depend on the inherent …