Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking (English)
- New search for: Dadkhah, Sajjad
- New search for: Manaf, Azizah Abd
- New search for: Sadeghi, Somayeh
- New search for: Hassanien, Aboul Ella
- New search for: Kim, Tai-Hoon
- New search for: Kacprzyk, Janusz
- New search for: Awad, Ali Ismail
- New search for: Dadkhah, Sajjad
- New search for: Manaf, Azizah Abd
- New search for: Sadeghi, Somayeh
In:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations
;
Chapter: 5
;
115-148
;
2014
- Article/Chapter (Book) / Electronic Resource
-
Title:Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking
-
Additional title:Intel.Syst.Ref.Library
-
Contributors:Hassanien, Aboul Ella ( editor ) / Kim, Tai-Hoon ( editor ) / Kacprzyk, Janusz ( editor ) / Awad, Ali Ismail ( editor ) / Dadkhah, Sajjad ( author ) / Manaf, Azizah Abd ( author ) / Sadeghi, Somayeh ( author )
-
Published in:Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ; Chapter: 5 ; 115-148Intelligent Systems Reference Library ; 70 ; 115-148
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2014-06-27
-
Size:34 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Bio-inspired Comprehensive Distributed Correlation Approach for Intrusion Detection Alerts and EventsBahaa-Eldin, Ayman M. et al. | 2014
- 2
-
Bio-inspired Evolutionary Sensory System for Cyber-Physical System SecurityAzab, Mohamed / Eltoweissy, Mohamed et al. | 2014
- 3
-
An Optimized Approach for Medical Image WatermarkingSoliman, Mona M. / Hassanien, Aboul Ella / Onsi, Hoda M. et al. | 2014
- 4
-
Bio-inspiring Techniques in Watermarking Medical Images: A ReviewSoliman, Mona M. / Hassanien, Aboul Ella / Onsi, Hoda M. et al. | 2014
- 5
-
Efficient Image Authentication and Tamper Localization Algorithm Using Active WatermarkingDadkhah, Sajjad / Manaf, Azizah Abd / Sadeghi, Somayeh et al. | 2014
- 6
-
TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc NetworksBahaa-Eldin, Ayman M. et al. | 2014
- 7
-
An Overview of Self-Protection and Self-Healing in Wireless Sensor NetworksGaber, Tarek / Hassanien, Aboul Ella et al. | 2014
- 8
-
Cybercrime Investigation Challenges: Middle East and North AfricaSarrab, Mohamed / Alalwan, Nasser / Alzahrani, Ahmed / Kordestani, Mahdi et al. | 2014
- 9
-
Multilayer Machine Learning-Based Intrusion Detection SystemAziz, Amira Sayed A. / Hassanien, Aboul Ella et al. | 2014
- 10
-
An Improved Key Management Scheme with High Security in Wireless Sensor NetworksSatish kumar, D. / Nagarajan, N. / Taher Azar, Ahmad et al. | 2014
- 11
-
Key Pre-distribution Techniques for WSN Security ServicesFouad, Mohamed Mostafa M. / Hassanien, Aboul Ella et al. | 2014
- 12
-
Fusion of Multiple Biometric Traits: Fingerprint, Palmprint and IrisManasa, N. L / Govardhan, A / Satyanarayana, Ch et al. | 2014
- 13
-
Biometric Recognition Systems Using Multispectral ImagingMeraoumia, Abdallah / Chitroub, Salim / Bouridane, Ahmed et al. | 2014
- 14
-
Electrocardiogram (ECG): A New Burgeoning Utility for Biometric RecognitionTantawi, Manal / Revett, Kenneth / Salem, Abdel-Badeeh / Tolba, M. Fahmy et al. | 2014
- 15
-
Image Pre-processing Techniques for Enhancing the Performance of Real-Time Face Recognition System Using PCANazarbakhsh, Behzad / Manaf, Azizah Abd et al. | 2014
- 16
-
Biometric and Traditional Mobile Authentication Techniques: Overviews and Open IssuesAmin, Reham / Gaber, Tarek / ElTaweel, Ghada / Hassanien, Aboul Ella et al. | 2014
- 17
-
Cloud Services Discovery and Selection: Survey and New Semantic-Based SystemAfify, Yasmine M. / Moawad, Ibrahim F. / Badr, Nagwa L. / Tolba, M. F. et al. | 2014
- 18
-
Data and Application Security in CloudBarnwal, Rajesh P. / Ghosh, Nirnay / Ghosh, Soumya K. et al. | 2014
- 19
-
Security Issues on Cloud Data ServicesZawawi, Nour / El-Eliemy, Mohamed Hamdy / El-Gohary, Rania / Tolba, Mohamed F. et al. | 2014
- 20
-
A Reputation Trust Management System for Ad-Hoc Mobile CloudsHammam, Ahmed / Senbel, Samah et al. | 2014
- 21
-
Secured and Networked Emergency Notification Without GPS Enabled DevicesMemon, Qurban A. et al. | 2014
- 22
-
Towards Cloud Customers Self-Monitoring and Availability-MonitoringHussein, Sameh / Abdelbaki, Nashwa et al. | 2014