2021
DOI: 10.1145/3414474
|View full text |Cite
|
Sign up to set email alerts
|

Joint Encryption and Compression-Based Watermarking Technique for Security of Digital Documents

Abstract: Recently, due to the increase in popularity of the Internet, the problem of digital data security over the Internet is increasing at a phenomenal rate. Watermarking is used for various notable applications to secure digital data from unauthorized individuals. To achieve this, in this article, we propose a joint encryption then-compression based watermarking technique for digital document security. This technique offers a tool for confidentiality, copyright protection, and strong compression performance of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(6 citation statements)
references
References 65 publications
0
6
0
Order By: Relevance
“…Among techniques for multimedia data, some has been specialized on copyright protection and tamper detection on video [38]- [40], audio [41], [42] and images [43], [44]. Later some approaches oriented to protect documents [45], [46] or textual content stored in relational databases [1], [47] emerged. Other techniques have been created to protect source code, and software [48], [49].…”
Section: Related Workmentioning
confidence: 99%
“…Among techniques for multimedia data, some has been specialized on copyright protection and tamper detection on video [38]- [40], audio [41], [42] and images [43], [44]. Later some approaches oriented to protect documents [45], [46] or textual content stored in relational databases [1], [47] emerged. Other techniques have been created to protect source code, and software [48], [49].…”
Section: Related Workmentioning
confidence: 99%
“…Video, music, animations, banners, signage, etc., can be supplied through ecommerce. It's as sophisticated as TV technology [9]. 5.…”
Section: Global Access -E-commerce Enables Cross-country Commercial Interactions Tomentioning
confidence: 99%
“…Some researchers have focused their efforts on detecting whether the medical images have been tampered. Others focused their efforts on identifying the tampered areas and repairing the tampered areas [ 3 , 4 ]. However, from the perspective of practical application, the authentication process of medical images should focus on whether the medical images have been tampered.…”
Section: Introductionmentioning
confidence: 99%