Cloud-assisted IoT-based smart respiratory monitoring system for asthma patients
In the modern era of technology, smart, secured, interactive, and comprehensive healthcare
is essential. The exponentially growing Internet of things (IoT) technologies with the growing …
is essential. The exponentially growing Internet of things (IoT) technologies with the growing …
A survey: digital image watermarking techniques
P Parashar, RK Singh - International Journal of signal processing, image …, 2014 - earticle.net
Multimedia security is extremely significant concern for the internet technology because of
the ease of the duplication, distribution and manipulation of the multimedia data. The digital …
the ease of the duplication, distribution and manipulation of the multimedia data. The digital …
Performance comparison of various watermarking techniques
P Garg, RR Kishore - Multimedia Tools and Applications, 2020 - Springer
Digital watermarking is a method to provide authenticity and copyright ownership to digital
content by embedding any presume content like audio, text, data or video into the original …
content by embedding any presume content like audio, text, data or video into the original …
Digital watermarking techniques for security applications
S Tyagi, HV Singh, R Agarwal… - … on Emerging Trends in …, 2016 - ieeexplore.ieee.org
Nowadays, the success of internet technology, made our life very much easy and
convenient. But the major problem is to secure the data from duplication and unauthorized …
convenient. But the major problem is to secure the data from duplication and unauthorized …
Study on watermarking techniques in digital images
P Pal, HV Singh, SK Verma - 2018 2nd international …, 2018 - ieeexplore.ieee.org
This paper comprehend the concept, details, properties, techniques and application of
digital watermarking. In today's era, with the increasing use of internet it's become …
digital watermarking. In today's era, with the increasing use of internet it's become …
The curse of correlations for robust fingerprinting of relational databases
Database fingerprinting have been widely adopted to prevent unauthorized sharing of data
and identify the source of data leakages. Although existing schemes are robust against …
and identify the source of data leakages. Although existing schemes are robust against …
Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data
Sharing genomic databases is critical to the collaborative research in computational biology.
A shared database is more informative than specific genome-wide association studies …
A shared database is more informative than specific genome-wide association studies …
[PDF][PDF] Copyright protection for digital image by watermarking technique
Due to the rapid growth and expansion of the Internet, the digital multimedia such as image,
audio and video are available for everyone. Anyone can make unauthorized copying for any …
audio and video are available for everyone. Anyone can make unauthorized copying for any …
A robust watermarking scheme using machine learning transmitted over high-speed network for smart cities
A Rai, HV Singh - Security in Smart Cities: Models, Applications, and …, 2019 - Springer
Medical images are more typical than any other ordinary images. In telemedicine
applications, transmission of medical image via open channel, demands strong security and …
applications, transmission of medical image via open channel, demands strong security and …
Complexity and compression efficiency assessment of 3D-HEVC encoder
This paper presents a complexity and compression efficiency assessment of the 3D-High
Efficiency Video Coding (3D-HEVC) encoder. An experimental evaluation was carried out to …
Efficiency Video Coding (3D-HEVC) encoder. An experimental evaluation was carried out to …