Chaotic Watermarking for Authentication
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate...
Saved in:
| Main Author: | Melad Saeed |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2013-07-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Fragile watermarking technique for detecting image
by: Yu-hong CHANG, et al.
Published: (2017-07-01)
by: Yu-hong CHANG, et al.
Published: (2017-07-01)
Similar Items
-
Chaotic sequences based watermarking wireless physical layer security authentication algorithm
by: CHEN Songlin
Published: (2025-07-01) -
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
by: Asia Abdullah, et al.
Published: (2025-06-01) -
Development of an audio watermarking with decentralization of the watermarks
by: Amita Singha, et al.
Published: (2022-06-01) -
Content authentication of H.264/AVC video stream based on semi-fragile watermarking
by: WANG Xiao-jing, et al.
Published: (2009-01-01) -
Efficient three-party authenticated key agreement protocol based on chaotic map
by: Xiong LI, et al.
Published: (2016-06-01)