Chaotic Watermarking for Authentication
This research concerns with generating and hiding invisible chaotic watermarking, in a manner different from that used in the rest of the known watermarks, has been presented. The work has two phases in each of which the chaotic function has been used twice. In the first phase it is used to generate...
Saved in:
| Main Author: | Melad Saeed |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Mosul University
2013-07-01
|
| Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
| Subjects: | |
| Online Access: | https://csmj.mosuljournals.com/article_163498_c18450bd02e3331f86dfcbdd72b34d25.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Biometric-based medical watermarking system for verifying privacy and source authentication
by: Nada Fadhil Mohammed, et al.
Published: (2020-07-01) -
Dual Hiding in Digital Image Files
by: Farah Mohammed
Published: (2011-07-01) -
Reversible Watermarking for Electrocardiogram Protection
by: Pavel Andreev, et al.
Published: (2025-03-01) -
Chaotic sequences based watermarking wireless physical layer security authentication algorithm
by: CHEN Songlin
Published: (2025-07-01) -
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
by: Asia Abdullah, et al.
Published: (2025-06-01)