2018
DOI: 10.1007/s11042-018-6501-8
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Secure Information using Digital Watermarking and Fuzzy Rule base

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…At present, many scholars have proposed many solutions for information security technologies, such as digital watermarking technology, authentication technology, and access control technology [22][23][24][25][26][27][28][29][30]. However, these technologies all have one thing in common, which is that they need to modify the whole system or redevelop a new system to realize its functions; this, in turn, leads to problems such as high costs or long cycle times.…”
Section: Related Workmentioning
confidence: 99%
“…At present, many scholars have proposed many solutions for information security technologies, such as digital watermarking technology, authentication technology, and access control technology [22][23][24][25][26][27][28][29][30]. However, these technologies all have one thing in common, which is that they need to modify the whole system or redevelop a new system to realize its functions; this, in turn, leads to problems such as high costs or long cycle times.…”
Section: Related Workmentioning
confidence: 99%