Cloud-assisted IoT-based smart respiratory monitoring system for asthma patients

STU Shah, F Badshah, F Dad, N Amin… - Applications of intelligent …, 2019 - Springer
In the modern era of technology, smart, secured, interactive, and comprehensive healthcare
is essential. The exponentially growing Internet of things (IoT) technologies with the growing …

A survey: digital image watermarking techniques

P Parashar, RK Singh - International Journal of signal processing, image …, 2014 - earticle.net
Multimedia security is extremely significant concern for the internet technology because of
the ease of the duplication, distribution and manipulation of the multimedia data. The digital …

Performance comparison of various watermarking techniques

P Garg, RR Kishore - Multimedia Tools and Applications, 2020 - Springer
Digital watermarking is a method to provide authenticity and copyright ownership to digital
content by embedding any presume content like audio, text, data or video into the original …

Digital watermarking techniques for security applications

S Tyagi, HV Singh, R Agarwal… - … on Emerging Trends in …, 2016 - ieeexplore.ieee.org
Nowadays, the success of internet technology, made our life very much easy and
convenient. But the major problem is to secure the data from duplication and unauthorized …

Study on watermarking techniques in digital images

P Pal, HV Singh, SK Verma - 2018 2nd international …, 2018 - ieeexplore.ieee.org
This paper comprehend the concept, details, properties, techniques and application of
digital watermarking. In today's era, with the increasing use of internet it's become …

The curse of correlations for robust fingerprinting of relational databases

T Ji, E Yilmaz, E Ayday, P Li - … of the 24th International Symposium on …, 2021 - dl.acm.org
Database fingerprinting have been widely adopted to prevent unauthorized sharing of data
and identify the source of data leakages. Although existing schemes are robust against …

Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data

T Ji, E Ayday, E Yilmaz, P Li - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
Sharing genomic databases is critical to the collaborative research in computational biology.
A shared database is more informative than specific genome-wide association studies …

[PDF][PDF] Copyright protection for digital image by watermarking technique

SA Ali, MJ Jawad, MA Naser - Journal of Information Processing …, 2017 - koreascience.kr
Due to the rapid growth and expansion of the Internet, the digital multimedia such as image,
audio and video are available for everyone. Anyone can make unauthorized copying for any …

A robust watermarking scheme using machine learning transmitted over high-speed network for smart cities

A Rai, HV Singh - Security in Smart Cities: Models, Applications, and …, 2019 - Springer
Medical images are more typical than any other ordinary images. In telemedicine
applications, transmission of medical image via open channel, demands strong security and …

Complexity and compression efficiency assessment of 3D-HEVC encoder

M Saldanha, R Conceição, V Afonso, G Avila… - Multimedia Tools and …, 2020 - Springer
This paper presents a complexity and compression efficiency assessment of the 3D-High
Efficiency Video Coding (3D-HEVC) encoder. An experimental evaluation was carried out to …