Watermarking for the Secure Transmission of the Key into an Encrypted Image
نویسندگان
چکیده
منابع مشابه
study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour
this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...
an inverstigation into the shrinkage behavior (kinetics) of microfilled hybrid and nano dental composites
چکیده ندارد.
15 صفحه اولthe use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولImage Watermarking for Secure Transmission over Public Networks
Digital watermarking represents a viable solution to the ever increasing demand for copyright protection mechanisms. A code number is indissolubly embedded in the document to be protected, thus allowing the identiica-tion of its creator, owner, authorized author, and so on. A new image watermarking algorithm is presented here which represents a sig-niicant improvement with respect to existing m...
متن کاملDistributed Key Generation for Secure Encrypted Deduplication
Large-scale storage systems often attempt to achieve two seemingly conflicting goals: (1) the systems need to reduce the copies of redundant data to save space, a process called deduplication; and (2) users demand encryption of their data to ensure privacy. Conventional encryption makes deduplication on ciphertexts ineffective, as it destroys data redundancy. A line of work, originated from Con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL
سال: 2020
ISSN: 1841-9844,1841-9836
DOI: 10.15837/ijccc.2020.6.3824