SKA Khalid, MM Deris… - International Journal of …, 2013 - inderscienceonline.com
Many digital image watermarking schemes have been developed to embed copyright information into an image. However, an attacker may reuse parts of a watermarked image by …
B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we take look at some historical applications of non-combinatorial squares and cubes in …
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly- secure cryptosystem guarantees that the malicious third party cannot guess anything …
S Jana, M Mallik, AK Maji, RK Pal - Proceedings of the International …, 2021 - Springer
Sudoku matrix is a unique Latin square-based mathematical structure, which may have several dimensions like 2D, 3D, etc. This structure has several applications in different …
Sudoku is a complicated multidimensional mathematical structure with several applications in various computer science domains. 3D Sudoku, compared to 2D, has one more …
Copyright information embedded in a digital data may disappear or become undetectable due to additive noise accidentally or deliberately introduced to a watermarked image …
شادی صانعی, شادی, نقش - روشهای هوشمند در صنعت برق, 2016 - research.iaun.ac.ir
With rapid development of digital technology, protecting information such as copyright, content ownership confirmation has become more important. In image watermarking …
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly secure cryptosystem guarantees that the malicious third party cannot guess anything …
SKA Khalid, MM Deris… - … Conference on IT …, 2014 - ieeexplore.ieee.org
Digital watermarking is one of the most important techniques employed to protect digital contents. Copyright information embedded in the digital contents may become undetectable …