Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "content authentication"

ADD TO MY LIST
 
A Study on Watermarking Schemes for Image Authentication

Author(s): S. Radharani | Dr. M.L. Valarmathi
Digital Watermarking: An Indirect Approach

Author(s): R.J.Bhiwani | S.M.Agrawal | M.A.Khan
Image Authentication Using Added Signal-Dependent Noise

Author(s): Xin Cindy Guo | Dimitrios Hatzinakos
Alternative Solutions for Off-Campus Authentication

Author(s): Rebekah Kilzer | Elizabeth L. Black | James Muir
PKI based Semi-Fragile Watermark for Visual Content Authentication

Author(s): Chamidu Atupelage | Koichi Harada
A Layered Approach for Watermarking in Images Based on Huffman Coding

Author(s): D. Lalitha Bhaskari | P. S. Avadhani, | M. Viswanath
A rapid and simple scheme for the standardization of polyherbal drugs

Author(s): Sharma Arvind | Gaurav S | Balkrishna Acharya
Evaluation of web sites for quality and contents of Asthma patient education

Author(s): Nagappa A | Sam K | Zarrin F | Saurabh H | Partha G | Pathak K
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Jian Ren | Yun Li | Tongtong Li
CNV Workshop: an integrated platform for high-throughput copy number variation discovery and clinical diagnostics

Author(s): Gai Xiaowu | Perin Juan | Murphy Kevin | O'Hara Ryan | D'arcy Monica | Wenocur Adam | Xie Hongbo | Rappaport Eric | Shaikh Tamim | White Peter
Content Distribution for Telecom Carriers

Author(s): Ben Falchuk | David Gorton | Dave Marples
Guest Editorial

Author(s): Min Young Chung | Jae-Hyun Kim | Masato Oguchi | Jeng-Shyang Pan
Review of Robust Video Watermarking Algorithms

Author(s): Mrs Neeta Deshpande | Dr.Archana Rajurkar | Dr. R Manthalkar
Content based Zero-Watermarking Algorithm for Authentication of Text Documents

Author(s): Zunera Jalil | Anwar M. Mirza | Maria Sabir
An Invisible Color Watermarking Framework for Uncompressed Video Authentication

Author(s): Soumik Das | Pradosh Bandyopadhyay | Shauvik Paul | Atal Chaudhuri | Monalisa Banerjee
A Web-Based Learning Portfolio Framework Built on Blog Services

Author(s): Hsien Tang Lin | Tsai-Hsing Kuo | Shyan-Ming Yuan
New Real Time Multicast Authentication Protocol

Author(s): Riham Abdellatif | Heba Kamal Aslan | Salwa H. Elramly
Quantization based Semi-fragile Watermarking Scheme for H.264 Video

Author(s): Yong Zhang | Zhe-Ming Lu | Dong-Ning Zhao
Digital watermark

Author(s): Jasna Maver
A Color Image Digital Watermarking Scheme Based on SOFM

Author(s): J. Anitha | S. Immanuel Alex Pandian
A Fuzzy QOS Keybase Secured Manet Routing with Multipath Data Fragmentation (FQKSMR)

Author(s): Manjunath Gadiparthi | Ramakrishna Paladugu | Sudhakar Paladugu | Muralidhar Vejendla
Image Content Authentication Using Pinned Sine Transform

Author(s): Yong Liang Guan | Xunzhan Zhu | Anthony T. S. Ho
A Secure and Robust Object-Based Video Authentication System

Author(s): Qi Tian | Qibin Sun | Dajun He
MPEG-4 IPMP Extension for Interoperable Protection of Multimedia Content

Author(s): Takuyo Kogure | Yasuda Hiroshi | Terumasa Aoki | Takafumi Ueno | Taka Senoh | Wenjun Zeng | S. M. Shen | Ming Ji
Watermarking-Based Digital Audio Data Authentication

Author(s): Jana Dittmann | Martin Steinebach
A Survey of Watermarking Algorithms for Image Authentication

Author(s): Jean-Luc Dugelay | Christian Rey
The First 50 Years of Electronic Watermarking

Author(s): Matt L. Miller | Ingemar J. Cox
Security issues in e-learning platforms

Author(s): Defta (Ciobanu) Costinela – Luminita
A Survey of Watermarking Algorithms for Image Authentication

Author(s): Rey Christian | Dugelay Jean-Luc
The First 50 Years of Electronic Watermarking

Author(s): Cox Ingemar J | Miller Matt L
Watermarking-Based Digital Audio Data Authentication

Author(s): Steinebach Martin | Dittmann Jana
SPM: Source Privacy for Mobile Ad Hoc Networks

Author(s): Ren Jian | Li Yun | Li Tongtong
Image Content Authentication Using Pinned Sine Transform

Author(s): Ho Anthony TS | Zhu Xunzhan | Guan Yong Liang
MPEG-4 IPMP Extension for Interoperable Protection of Multimedia Content

Author(s): Ji Ming | Shen SM | Zeng Wenjun | Senoh Taka | Ueno Takafumi | Aoki Terumasa | Hiroshi Yasuda | Kogure Takuyo
A Secure and Robust Object-Based Video Authentication System

Author(s): He Dajun | Sun Qibin | Tian Qi
Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication

Author(s): Liu Hongmei | Yao Xinzhi | Huang Jiwu
A Survey on Security in Medical Image Communication

Author(s): A. Umamageswari | M. Ferni Ukrit | Dr.G. R. Suresh
WoT model for authenticity contents in virtual learning platforms

Author(s): Paulo A. Gaona-Garcia | Jesús Soto-Carrión
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
Guest Editorial

Author(s): Jean-Henry Morin | Shiguo Lian | Xin Wang | David Llewellyn-Jones
Security in Collaborative Multimedia Web-based Art Projects

Author(s): Dimitrios K. Koukopoulos | Georgios D. Styliaras
Guest Editorial

Author(s): Lei Shu | Hsiao-Hwa Chen | Takahiro Hara | Der-Jiunn Deng | Lei Wang
IMAGE WATERMARKING: A SURVEY

Author(s): Sirsendu Sarbavidya
SemiFragile Watermarking Scheme based on Feature in Dwt Domain

Author(s): Chaitanya Kommini | Kamalesh Ellanti | E. Harshavardhan Chowdary
Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT

Author(s): M.El Hajji | H. Ouaha | K. Afdel | H. Douzi
Determining Watermark Embedding Strength using Complex Valued Neural Network

Author(s): R.F. Olanrewaju | O.O. Khalifa | Aisha- Abdulla | A.A. Aburas | A.M. Zeki
Peak Detection based Spread Spectrum Audi Watermarking using Discrete Wavelet Transform

Author(s): Neha Baranwal | Kamalika Datta | Bismita Gadanayak
Invariant Image Watermarking Using Accurate Zernike Moments

Author(s): Ismail A. Ismail | Mohamed A. Shouman | Khalid M.  Hosny | Hayam M.A. Salam
Affiliate Program     

Tango Rapperswil
Tango Rapperswil