Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

[PDF][PDF] Sistem Legalisir Scan Ijasah Online Berbasis QR Code dan Watermarking

EY Hidayat, F Firdausillah, K Hastuti - Techno. Com, 2015 - academia.edu
Dokumen ijasah memiliki arti penting bagi pemiliknya sebagai bukti seseorang telah
menyelesaikan satu tahap studi yang ditempuh. Ijasah juga termasuk syarat utama ketika …

Hardcopy document authentication based on public key encryption and 2D barcodes

MH Eldefrawy, K Alghathbar… - … on Biometrics and …, 2012 - ieeexplore.ieee.org
In document authentication, the context refers to the ability to trace the origins of a document
to a given person, the device that produced it, or the time and/or place it was produced …

Method, apparatus and system for generating and verifying color barcode

EJ Farn, C You-Lin, CW Chen, NC Wu - US Patent 9,311,652, 2016 - Google Patents
A method, an apparatus, and a system for generating and verifying a color barcode are
provided. The method for verifying the color barcode is adapted to an electronic apparatus to …

Application of 2D barcode in hardcopy document verification system

M Salleh, TC Yew - Advances in Information Security and Assurance …, 2009 - Springer
Forgery can cause significant damage in terms of trust and authenticity. Therefore, it is
essential that the integrity of important documents should be maintained to avoid implication …

Generation and analysis of graphical codes using textured patterns for printed document authentication

I Tkachenko - 2015 - theses.hal.science
Due to the development and availability of printing and scanning devices, the number of
forged/counterfeited valuable documents and product packages is increasing. Therefore …

Secure image steganography using dual-tree complex wavelet transform block matching

IJ Kadhim, P Premaratne - 2018 Second international …, 2018 - ieeexplore.ieee.org
Along with the thriving advancements in internet facility and related technology domain,
information security becomes a key factor in the modern communication systems. Hackers …

Methods and systems for verifying authenticity of products

SV Nair - US Patent 10,140,492, 2018 - Google Patents
Embodiments provide methods and systems for verifying authenticity of products. In an
embodiment, an image of at least a part of a product label of a product is scanned and …

Modern steganography method based on Shearlet transformation with quad chain code

MM Mohamed, AS Nori - AIP Conference Proceedings, 2024 - pubs.aip.org
The great and rapid development that is taking place in the areas of data transmission, the
Internet, and multimedia has become a basic approach to life, and because of that, it has …

Implementation and evaluation of mobile ticket validation systems for value-added services

D Skarica, H Belani, S Illes - SoftCOM 2009-17th International …, 2009 - ieeexplore.ieee.org
Although barcode was invented about sixty years ago, barcode technology became
applicable for value-added services in telecommunication industry just few years back …