2021
DOI: 10.1155/2021/5580098
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Optimized Graph-Based Transform Watermarking Technique to Address Security Issues in Real-Time Application

Abstract: The multimedia technologies are gaining a lot of popularity these days. Many unauthorized persons are gaining the access of multimedia such as videos, audios, and images. The transmission of multimedia across the Internet by unauthorized person has led to the problem of illegal distribution. The problem arises when copyrighted data is getting accessed without the knowledge of copyright owner. The videos are the most attacked data during COVID-19 pandemic. In this paper, the frame selection video watermarking t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Edge hubs are spread across the network. A single hub's size and power consumption are very limited, and its registration and storing capabilities pale in comparison to the distributed computing community [34]. Even though the current distributed computing community's inconsistency detection framework and adaptation to non-critical failure instruments are quite experienced, they will cost a significant amount of resources, making them incompatible with the edge registering framework.…”
Section: Anomaly Detection Testmentioning
confidence: 99%
“…Edge hubs are spread across the network. A single hub's size and power consumption are very limited, and its registration and storing capabilities pale in comparison to the distributed computing community [34]. Even though the current distributed computing community's inconsistency detection framework and adaptation to non-critical failure instruments are quite experienced, they will cost a significant amount of resources, making them incompatible with the edge registering framework.…”
Section: Anomaly Detection Testmentioning
confidence: 99%
“…The IoV system could be harmed by these attacks, which could weaken its resistance and reliability or, in the worst case, bring it to a standstill and result in accidents. The GKA scheme proposed by Reference [ 12 ] uses pseudonyms for cluster authentication and key update. It uses aliases to construct digital signatures while simultaneously authenticating cluster vehicles to prevent the leakage of vehicle trajectory privacy.…”
Section: Introductionmentioning
confidence: 99%
“…Hilbert‐Huang transform (HHT) is an adaptive time–frequency analysis method, which overcomes the defects of traditional spectrum analysis methods. The HHT method is used to analyze the signal, which has good time–frequency aggregation, can obtain very high time–frequency resolution, and is very suitable for analyzing the non‐stationary signals that may be included in the rotor vibration signal [8]. In this paper, taking the spindle of mechanical manufacturing numerical control (NC) machine tool as an example, the mechanical manufacturing vibration monitoring system based on HHT feature extraction is studied.…”
Section: Introductionmentioning
confidence: 99%