RM Thanki, AM Kothari - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
When digital images are shared over an open access network such as the internet, facebook, WhatsApp, and other social media, then the security of these images are required …
In this paper, we present a novel scheme for enhancing the security of speech information in communication systems. We build a hybridization of three approaches: Chaotic logistic and …
Robustness, imperceptibility and embedding capacity are the preliminary requirements of any digital audio watermarking technique. However, research has concluded that these …
Q Wu, A Qu, D Huang - Mathematical Problems in Engineering, 2020 - Wiley Online Library
How to effectively resist synchronization attacks is the most challenging topic in the research of robust watermarking algorithms. A robust and blind audio watermarking algorithm for …
Q Wu, D Huang, J Wei, W Chen - Math. Biosci. Eng, 2023 - aimspress.com
How to improve the robustness to resist attacks and how to adaptively match the key parameters of the watermarking algorithm with the performance requirements to achieve the …
S Saadi, A Merrad - Telecommunication Systems, 2024 - Springer
In this paper, we propose a novel watermarking method in order to enhance the security in biometric voice/speech transmission systems basing on sub-sampling, discrete cosine …
R Kumar, J Yadav - Journal of Information Security and Applications, 2022 - Elsevier
With the increased use of the Internet in everyday life, data transmission over the internet needs to be secure, so it necessitates the adoption of watermarking. Watermarking is the …
In this book, we have detailed our Image Watermarking Techniques which are proposed in the literature. The first technique detailed in Chap. 1, is entitled Image Watermarking Using …
B Sharma, M Dave - 2019 3rd International conference on …, 2019 - ieeexplore.ieee.org
Hybrid Watermarking Approach is one of the trending approaches in the field of information security. Watermarking has a variety of applications to ensure data authentication, security …