A wireless video surveillance system consists of three major components: 1) the video capture and preprocessing; 2) the video compression and transmission in wireless sensor …
Y Li, H Guo, S Jajodia - Proceedings of the 4th ACM workshop on Digital …, 2004 - dl.acm.org
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In this …
Nowadays, with more and more data publicly available on the Internet, it is increasingly important to ensure the integrity of these data. The traditional solution is to use a digital …
H Guo, Y Li, S Jajodia - Information Sciences, 2007 - Elsevier
Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP …
This paper presents a novel scheme to implement blind image watermarking based on the feature parameters extracted from a composite domain including the discrete wavelet …
A Khan, SA Husain - The Scientific World Journal, 2013 - hindawi.com
We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for …
Limited energy is the most critical constraint that limits the capabilities of wireless sensor networks (WSNs). Most sensors operate on batteries with limited power. Battery recharging …
In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal watermark embedding and authentication, reversibility, robustness, and others, which must …
F Madine, MA Akhaee, N Zarmehi - Signal Processing: Image …, 2018 - Elsevier
The widespread application of the H. 264 video compression standard necessitates proper design of copyright protection algorithms. In this paper, a new blind multiplicative video …