ASIC and FPGA comparative study for IoT lightweight hardware security algorithms

N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …

Multipurpose image watermarking algorithm based on multistage vector quantization

ZM Lu, DG Xu, SH Sun - IEEE Transactions on Image …, 2005 - ieeexplore.ieee.org
The rapid growth of digital multimedia and Internet technologies has made copyright
protection, copy protection, and integrity verification three important issues in the digital …

A novel chaos-based fragile watermarking for image tampering detection and self-recovery

X Tong, Y Liu, M Zhang, Y Chen - Signal Processing: Image …, 2013 - Elsevier
In this paper, a novel watermarking approach is proposed to provide enhanced tampering
localization and self-recovery. A cross chaotic map is used to confuse the blocks generated …

[图书][B] 数字图像压缩编码(信号与信息处理丛书)

张春田, 苏育挺 - 2006 - books.google.com
Ben shu zhu yao jie shao le shu zi tu xiang yu shi pin ya suo bian ma de ji ben yuan li, Zhu
yao ji shu ji qi ying yong, Bao kuo shi jue te xing yu tu xiang zhi liang, Tu xiang xin hao de …

A watermarking-based image ownership and tampering authentication scheme

CC Chang, YS Hu, TC Lu - Pattern Recognition Letters, 2006 - Elsevier
Nowadays, image authentication schemes are widely applied to ownership protection and
tampering detection of digital images. In this paper, we propose an image ownership and …

[HTML][HTML] Digital image watermarking: its formal model, fundamental properties and possible attacks

H Nyeem, W Boles, C Boyd - EURASIP Journal on Advances in Signal …, 2014 - Springer
While formal definitions and security proofs are well established in some fields like
cryptography and steganography, they are not as evident in digital watermarking research. A …

Time varying evaluation of multimedia content

R Petrovic, PG Downes - US Patent 8,726,304, 2014 - Google Patents
Methods, systems, devices and computer program products are provided to facilitate
enhanced use and interaction With multimedia content that is based on a time-varying …

Second screen content

JM Winograd, PR Johnson, WC Houle - US Patent 8,869,222, 2014 - Google Patents
4,564,862 4,593.904 4,639,779 4,669,089 4,677.466 4,686,707 4,703,476 4,706,282
4,723,302 4,729,398 4,739,398 4,750,173 4,755,871 4,755,884 4,764,608 4,764,808 …

Semi-fragile watermarking scheme for authentication of JPEG images

CK Ho, CT Li - … and Computing, 2004. Proceedings. ITCC 2004., 2004 - ieeexplore.ieee.org
With the increasing popularity of JPEG images, a need arises to devise effective
watermarking techniques which consider JPEG compression as an acceptable …

A new semi-fragile image watermarking with robust tampering restoration using irregular sampling

X Zhu, ATS Ho, P Marziliano - Signal Processing: Image Communication, 2007 - Elsevier
This paper presents a semi-fragile watermarking method for the automatic authentication
and restoration of the content of digital images. Semi-fragile watermarks are embedded into …