Due to the rapid development of the Internet and storing data, several security attacks have taken place, causing deep fears to computer users. On the other hand, many computer users mainly depend on different techniques to protect their data and keep them safe and secure, including their private images, since they are important and sensitive. Some currently applied procedures do not provide enough protection for the privacy of the stored images. Consequently, researchers are exerting great effort to search for images in a more secure way using different codes. The primary purpose of this thesis is to solve the issue of data security to reduce the chance or possibility of losing these images. A procedure has been introduced to search for im...
Internet security finds it difficult to keep the information secure and to maintain the integrity of...
AbstractThis paper introduces keytagging, a novel technique to protect medical image-based tests by ...
In image retrieval applications for multi-users, users can retrieve similar images in a database. Th...
The proliferation of digital images creates problems for managing large image databases, indexing in...
ABSTRACT- Increasing popularity of storing and managing personal multimedia data using online servic...
Thanks to recent breakthroughs in photographic and digital technology, enormous amounts of image dat...
This book addresses the problems that hinder image authentication in the presence of noise. It consi...
Security of multimedia data is gaining acceptance owing to the growth and acceptability of images in...
Abstract — An efficient two-stage image search method for the extraction of illegal copies on the In...
Abstract — A robust authentication method is developed for detecting image forgery including removal...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
There has been tremendous advancement in multimedia in recent time. There are cameras everywhere aro...
Now a day�s,with the rapid increasing growth of Internet and multimedia data,security is the main pr...
Nowadays while transferring and receiving the data like images, messages and other information, cert...
With the popularity and affordability of advanced digital image editing software, users can manipula...
Internet security finds it difficult to keep the information secure and to maintain the integrity of...
AbstractThis paper introduces keytagging, a novel technique to protect medical image-based tests by ...
In image retrieval applications for multi-users, users can retrieve similar images in a database. Th...
The proliferation of digital images creates problems for managing large image databases, indexing in...
ABSTRACT- Increasing popularity of storing and managing personal multimedia data using online servic...
Thanks to recent breakthroughs in photographic and digital technology, enormous amounts of image dat...
This book addresses the problems that hinder image authentication in the presence of noise. It consi...
Security of multimedia data is gaining acceptance owing to the growth and acceptability of images in...
Abstract — An efficient two-stage image search method for the extraction of illegal copies on the In...
Abstract — A robust authentication method is developed for detecting image forgery including removal...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
There has been tremendous advancement in multimedia in recent time. There are cameras everywhere aro...
Now a day�s,with the rapid increasing growth of Internet and multimedia data,security is the main pr...
Nowadays while transferring and receiving the data like images, messages and other information, cert...
With the popularity and affordability of advanced digital image editing software, users can manipula...
Internet security finds it difficult to keep the information secure and to maintain the integrity of...
AbstractThis paper introduces keytagging, a novel technique to protect medical image-based tests by ...
In image retrieval applications for multi-users, users can retrieve similar images in a database. Th...