Cerberus: a context-aware security scheme for smart spaces

J Al-Muhtadi, A Ranganathan… - Proceedings of the …, 2003 - ieeexplore.ieee.org
Ubiquitous computing has fueled the idea of constructing sentient, information-rich" smart
spaces" that extend the boundaries of traditional computing to encompass physical spaces …

Data hiding based on improved exploiting modification direction method and Huffman coding

AM Ahmad, G Sulong, A Rehman… - Journal of Intelligent …, 2014 - degruyter.com
The rapid growth of covert activities via communications network brought about an
increasing need to provide an efficient method for data hiding to protect secret information …

Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology

N Dey, M Dey, SK Mahata, A Das… - … Journal of Signal …, 2015 - inderscienceonline.com
The current globalised era is marked with a rapid increase in the use of wireless media to
exchange information over globally distributed locations. This advancement and growth of …

Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method

N Dey, P Das, SS Chaudhuri, A Das - Proceedings of the fifth …, 2012 - dl.acm.org
The present medical era has seen quite a considerable amount of work been done in tele-
monitoring that involves transmission of biomedical signals through wireless media …

Digital image watermarking, analysis of current methods

GN Mohammed, A Yasin… - … international conference on …, 2012 - ieeexplore.ieee.org
The rapid evolution in data transmission by the wide use of the internet, as provided an
urgent need to prevent penetration and maintain the confidentiality of this data through the …

[PDF][PDF] A new fuzzy performance modeling for evaluating the trade-off among robustness, quality and capacity in watermarking algorithms

MS Emami, GB Sulong, SB Seliman - Int. J. Innov. Comput. Inf …, 2012 - researchgate.net
There are several digital watermarking metrics proposed by researchers. These metrics can
determine the robustness and the imperceptibility of watermarking schemes discretely. Here …

Copyright protection for digital certificate using blind watermarking technique

HR Hasan - Kurdistan Journal of Applied Research, 2018 - kjar.spu.edu.iq
This paper proposes a copyright protection system for digital certificate image using blind
watermarking technique by applying discrete wavelet transform algorithm (DWT). The …

[PDF][PDF] A New Steganography Technique Using Knight's Tour Algorithm, Affine Cipher and Huffman Coding

AT Mohsin - 2013 - eprints.utm.my
Steganography is a way to conceal secret message under a cover image, and is one of the
most widespread approaches of securing information. The challenge of steganographic …

[PDF][PDF] Set removal attack: A new geometric watermarking attack

MS Emami, GB Sulong - International Conference on Future …, 2011 - researchgate.net
These days there are several watermarking attacks which originated from general
image/signal processing operations. To assess the robustness of watermarking schemes …

Improvement of the quality for digital image watermarking based on dual ISB

GN Mohammed, A Yasin… - … Conference on IT …, 2013 - ieeexplore.ieee.org
The impeccability (quality) represent as one of the most important requirements of any
watermarking system of the watermarked gray scale image. In most studies, the …