Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2011
A chip-based watermarking framework for color image authentication
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecurityPages 178–183https://doi.org/10.1145/1947940.1947979In today's scenario authentication of multimedia contents have received a sharp attention as a result of epidemic development of cyber crime. Illegal replication, misappropriation of digital content has achieved an enigmatic growth. In this regard we've ...
- research-articleFebruary 2011
A fragile color image watermarking framework focusing a new invisible domain
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecurityPages 172–177https://doi.org/10.1145/1947940.1947978Authentication of multimedia contents attended a broad attention due to illegal copying of digital contents and unauthorized recording and distribution that leads cyber crime in a massive form. Our focused area is digital color image and its ...
- ArticleOctober 2009
A Dynamic Watermarking Scheme for Color Image Authentication
ARTCOM '09: Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and ComputingPages 314–318https://doi.org/10.1109/ARTCom.2009.94Image authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image, volatiles the authenticity of image-ownership. In this regard we’ve already proposed different ...
- research-articleApril 2008
Fragile: a case study for evoking specific emotional responses
CHI EA '08: CHI '08 Extended Abstracts on Human Factors in Computing SystemsPages 2543–2552https://doi.org/10.1145/1358628.1358711Designers and artists often seek to evoke specific, nuanced sets of emotional responses [1], but attempting to predict the reaction of a given target audience can be daunting. As a first step, it is helpful to create prototypical systems of objects and ...