Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi …
Evaluating and benchmarking software and hardware field programmable gate array
(FPGA)-based digital watermarking are considered challenging tasks because of multiple …
(FPGA)-based digital watermarking are considered challenging tasks because of multiple …
A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on 'large‐scale data'
Digital watermarking evaluation and benchmarking are challenging tasks because of
multiple evaluation and conflicting criteria. A few approaches have been presented to …
multiple evaluation and conflicting criteria. A few approaches have been presented to …
A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques
This paper presents a new approach based on multi-dimensional evaluation and
benchmarking for data hiding techniques, ie, watermarking and steganography. The novelty …
benchmarking for data hiding techniques, ie, watermarking and steganography. The novelty …
[PDF][PDF] Survey and analysis of hardware cryptographic and steganographic systems on FPGA
S Rajagopalan, R Amirtharajan… - Journal of Applied …, 2012 - researchgate.net
Little brooks make great rivers-says a proverb. Information science involves not only the
efforts made for gathering, acquiring or collecting the data that corresponds to the …
efforts made for gathering, acquiring or collecting the data that corresponds to the …
Steganography and steganalysis for digital image enhanced Forensic analysis and recommendations
KD Michaylov, DK Sarmah - Journal of Cyber Security Technology, 2024 - Taylor & Francis
Image steganography and steganalysis, which involve concealing and uncovering hidden
data within images, have gained significant attention in recent years, finding applications in …
data within images, have gained significant attention in recent years, finding applications in …
Notice of Removal: Performance analysis of LSB, DCT, and DWT for digital watermarking application using steganography
S Chandran, K Bhattacharyya - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Notice of Removal: Performance analysis of LSB, DCT, and DWT for digital watermarking
application using steganography | IEEE Conference Publication | IEEE Xplore Notice of …
application using steganography | IEEE Conference Publication | IEEE Xplore Notice of …
Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking
Recently, piracy and copyright violations of digital content have become major concerns as
computer science has advanced. In order to prevent unauthorized usage of content, digital …
computer science has advanced. In order to prevent unauthorized usage of content, digital …
[PDF][PDF] Fuzzy Multi Criteria Decision Analysis Method for Assessing Security Design Tactics for Web Applications.
Security and design tactics estimation of web application for ensuring the security, efficiency
and design tactics of web applications is necessary. A survey conducted by the security …
and design tactics of web applications is necessary. A survey conducted by the security …
A computing coordination based fuzzy group decision-making (CC-FGDM) for web service oriented architecture
MJ Tsai, CS Wang - Expert Systems with Applications, 2008 - Elsevier
As the demands for faster data processing and enterprise computing are increasing, the
traditional client/server architecture has gradually been replaced by Grid computing or the …
traditional client/server architecture has gradually been replaced by Grid computing or the …
ATHENa-automated tool for hardware evaluation: Toward fair and comprehensive benchmarking of cryptographic hardware using FPGAs
A fair comparison of functionally equivalent digital system designs targeting FPGAs is a
challenging and time consuming task. The results of the comparison depend on the inherent …
challenging and time consuming task. The results of the comparison depend on the inherent …