MATEC Web Conf.
Volume 336, 20212020 2nd International Conference on Computer Science Communication and Network Security (CSCNS2020)
|Number of page(s)||9|
|Section||Intelligence Algorithms and Application|
|Published online||15 February 2021|
- Wuyoung Z, Chen J, Yufeng Z. Global resynchronization-based image watermarking resilient to geometric attacks. Comput Electr Eng 2018;67(1):182-94. [Google Scholar]
- Ayesha SK, Masilamani V. A novel digital watermarking scheme for data authentication and copyright protection in 5G networks. Comput Electr Eng 2018;72:614-30. [Google Scholar]
- Y.G. Wang, D. Xie, B.B. Gupta, A study on the collusion security of LUT-based client-side watermark embedding, IEEE Access 6 (2018) 15816-15822. [Google Scholar]
- Brij B. Gupta et al, Handbook of Computer Networks and Cyber Security, Springer, 2020 [Google Scholar]
- A.Z. Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J. Ho, NRA Mee. Electronic Watermark. Digital Image Computing[J], Technology and Applications DICTA 93. Sidney: Maquarie University, 1993: 666-673. [Google Scholar]
- R.G. Van Schyndel, A.Z. Tirkel, C.F. Osborne. A Digital Watermark. International Conference on Image Processing, IEEE Press, 1994 [Google Scholar]
- Cox I.J,Kilian J,Leighton F.T,Shamoon T. Secure spread spectrum watermarking for multimedia[J]. IEEE transactions on image processing : a publication of the IEEE Signal Processing Society,1997,6(12). [Google Scholar]
- Tan Linglong, He Yihong, Wu Fengzhi, et al. A Blind Watermarking Algorithm for Digital Image Based on DWT. 2020, 1518(1): 012068. [Google Scholar]
- Halima N.B, Hosam O. Embedding image ROI watermark into median DCT coefficients[J]. International Review on Computers & Software, 2015, 10(6):643. [Google Scholar]
- V. Santhi, and A Thangavelu,” DC Coefficients Based Watermarking Technique for color Images Using Singular Value Decomposition”, International Journal of Computer and Electrical Engineering, Vol.3, No.1, pp. 8-16, February, 2011 [Google Scholar]
- M Zhao and Y Dang, “Color Image Copyright Protection Digital Watermarking Algorithm Based on DWT & DCT”,4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, pp.1-4, 12-14 Oct. 2008 [Google Scholar]
- Amit Kumar Singh, Basant Kumar, Sanjay Kumar Singh, et al. Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. 2018, 86:926-939. [Google Scholar]
- Haiming Li, Xiaoyun Guo. "Embedding and Extracting Digital Watermark Based on DCT Algorithm. 2019, 2019 [Google Scholar]
- Na Na Zhang, Li Yu, Xiao Fang Yang. Research of Digital Image Watermarking Robustness Algorithm Based on DCT. 2014, 3181:3171-3174. [Google Scholar]
- Smith L.C, Turcotte D.L, Isacks B.L. Stream flow characterization and feature detection using a discrete wavelet transform[J]. Hydrological Processes, 2015, 12(2):233-249. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.