Watermark is traditionally used for protecting copyrighted materials such as scripts, movies, images or sounds. Nowadays, the watermark is still widely used but more in a digitized environment. There are many ways of how the watermarks are being applied. In this paper, the watermark is not applied for the purpose of protecting copyrighted materials but more on digitally securing user authentication data used for accessing mobile application systems (mobile apps). A user authentication model is developed to improve the access control to mobile apps. The model introduces three protection techniques namely multi-factoring, ciphering and watermarking techniques. In multi-factoring technique, the number of user authentication factors is increase...
With the increasing growth of multimedia applications and the traffic load explosion on various netw...
The rapid diffusion of mobile devices (telephones, smart phones, tablets, etc.) has brought new adva...
The rapid diffusion of mobile devices (telephones, smart phones, tablets, etc.) has brought new adva...
In today’s digital communication era, people around the world can conveniently communicate with eac...
In today’s digital communication era, people around the world can conveniently communicate with eac...
In today’s digital communication era, people around the world can conveniently communicate with eac...
For most of us now, life is incomplete if living without mobile phones. This is because mobile phone...
There have been many cases of fake documents be used for important legal transactions. This includes...
Nowadays, we can seen many people are occupied with their mobiles almost anywhere and at anytime. Ba...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
The mind setup of persons has been changed in today’s environment due to the easily available of int...
Digital watermarking is well known as enabling technology to prove ownership on copyrighted material...
In our security-conscious society today, two factor authentication has been widely deployed for user...
This paper reviewed mobile applications schemes for image watermarking techniques used to secure use...
Smartphone devices have become an essential part of our daily activities for performing various esse...
With the increasing growth of multimedia applications and the traffic load explosion on various netw...
The rapid diffusion of mobile devices (telephones, smart phones, tablets, etc.) has brought new adva...
The rapid diffusion of mobile devices (telephones, smart phones, tablets, etc.) has brought new adva...
In today’s digital communication era, people around the world can conveniently communicate with eac...
In today’s digital communication era, people around the world can conveniently communicate with eac...
In today’s digital communication era, people around the world can conveniently communicate with eac...
For most of us now, life is incomplete if living without mobile phones. This is because mobile phone...
There have been many cases of fake documents be used for important legal transactions. This includes...
Nowadays, we can seen many people are occupied with their mobiles almost anywhere and at anytime. Ba...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
The mind setup of persons has been changed in today’s environment due to the easily available of int...
Digital watermarking is well known as enabling technology to prove ownership on copyrighted material...
In our security-conscious society today, two factor authentication has been widely deployed for user...
This paper reviewed mobile applications schemes for image watermarking techniques used to secure use...
Smartphone devices have become an essential part of our daily activities for performing various esse...
With the increasing growth of multimedia applications and the traffic load explosion on various netw...
The rapid diffusion of mobile devices (telephones, smart phones, tablets, etc.) has brought new adva...
The rapid diffusion of mobile devices (telephones, smart phones, tablets, etc.) has brought new adva...