Twenty years of digital audio watermarking—a comprehensive review

G Hua, J Huang, YQ Shi, J Goh, VLL Thing - Signal processing, 2016 - Elsevier
Digital audio watermarking is an important technique to secure and authenticate audio
media. This paper provides a comprehensive review of the twenty years' research and …

Wireless video surveillance: A survey

Y Ye, S Ci, AK Katsaggelos, Y Liu, Y Qian - IEEE Access, 2013 - ieeexplore.ieee.org
A wireless video surveillance system consists of three major components: 1) the video
capture and preprocessing; 2) the video compression and transmission in wireless sensor …

Tamper detection and localization for categorical data using fragile watermarks

Y Li, H Guo, S Jajodia - Proceedings of the 4th ACM workshop on Digital …, 2004 - dl.acm.org
Today, database relations are widely used and distributed over the Internet. Since these
data can be easily tampered with, it is critical to ensure the integrity of these data. In this …

A fragile watermarking scheme for detecting malicious modifications of database relations

H Guo, Y Li, A Liu, S Jajodia - Information Sciences, 2006 - Elsevier
Nowadays, with more and more data publicly available on the Internet, it is increasingly
important to ensure the integrity of these data. The traditional solution is to use a digital …

Chaining watermarks for detecting malicious modifications to streaming data

H Guo, Y Li, S Jajodia - Information Sciences, 2007 - Elsevier
Authenticating streaming data is a very important research area due to its wide range of
applications. Previous technologies mainly focused on authenticating data packets at the IP …

Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression

HT Hu, LY Hsu - Computers & Electrical Engineering, 2015 - Elsevier
This paper presents a novel scheme to implement blind image watermarking based on the
feature parameters extracted from a composite domain including the discrete wavelet …

[HTML][HTML] A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations

A Khan, SA Husain - The Scientific World Journal, 2013 - hindawi.com
We put forward a fragile zero watermarking scheme to detect and characterize malicious
modifications made to a database relation. Most of the existing watermarking schemes for …

[HTML][HTML] A lightweight data integrity scheme for sensor networks

I Kamel, H Juma - Sensors, 2011 - mdpi.com
Limited energy is the most critical constraint that limits the capabilities of wireless sensor
networks (WSNs). Most sensors operate on batteries with limited power. Battery recharging …

[HTML][HTML] LRW-CRDB: Lossless robust watermarking scheme for categorical relational databases

CC Lin, TS Nguyen, CC Chang - Symmetry, 2021 - mdpi.com
In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal
watermark embedding and authentication, reversibility, robustness, and others, which must …

A multiplicative video watermarking robust to H. 264/AVC compression standard

F Madine, MA Akhaee, N Zarmehi - Signal Processing: Image …, 2018 - Elsevier
The widespread application of the H. 264 video compression standard necessitates proper
design of copyright protection algorithms. In this paper, a new blind multiplicative video …