Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 14 of 14.

Add to Quick Collection   All 14 Results

  • First
  • Previous
  • 1
  • Next
  • Last
Sort:
 Add All Items to Quick Collection
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/154349
Description: Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organiz ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/168783
Description: There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to ... More
Date: 2011
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/167109
Description: Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Ag ... More
Reviewed: Reviewed
Date: 2011
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/154352
Description: Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117569
Description: There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifyin ... More
Reviewed: Reviewed
Date: 2009
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/117596
Description: There has been significant research in the field of database watermarking recently. However, there has not been sufficient attention given to the requirement of providing reversibility (the ability to ... More
Reviewed: Reviewed
Date: 2009
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117951
Description: Numeric sets can be used to store and distribute important information such as currency exchange rates and stock forecasts. It is useful to watermark such data for proving ownership in case of illegal ... More
Reviewed: Reviewed
Date: 2008
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117401
Description: Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restore ... More
Reviewed: Reviewed
Authors: Gupta, Gaurav
Date: 2008
Language: eng
Resource Type: Thesis PhD
Identifier: http://hdl.handle.net/1959.14/28597
Description: Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008.
Full Text: Full Text
Date: 2008
Subject Keyword: 080400 Data Format
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/117557
Description: In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inser ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/116772
Description: Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restore ... More
Reviewed: Reviewed
Date: 2007
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/69991
Description: In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The software watermarking model is based ... More
Full Text: Full Text
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/100694
Description: n 2005, Ginger Myles and Hongxia Jin proposed a software watermarking scheme based on converting jump instructions or unconditional branch statements (UBSs) by calls to a fingerprint branch function ( ... More
Reviewed: Reviewed
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/106360
Description: We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs ... More
Reviewed: Reviewed
  • First
  • Previous
  • 1
  • Next
  • Last