2018
DOI: 10.1016/j.future.2016.11.023
|View full text |Cite
|
Sign up to set email alerts
|

Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 135 publications
(54 citation statements)
references
References 24 publications
0
50
0
3
Order By: Relevance
“…These techniques are shown in Table 1. For example, in [40], a DCT, DWT, and SVD-based study, based on multiple watermarking techniques for securing online social network content, was proposed. A three-level DWT was applied to the host image for embedding the watermark, and a back-propagation Information 2020, 11, 110 8 of 38 neural network (BPNN) algorithm was applied to the extracted watermark image to minimize the distortion between the host image and the watermarked image.…”
Section: Techniques That Meet Requirements Simultaneouslymentioning
confidence: 99%
“…These techniques are shown in Table 1. For example, in [40], a DCT, DWT, and SVD-based study, based on multiple watermarking techniques for securing online social network content, was proposed. A three-level DWT was applied to the host image for embedding the watermark, and a back-propagation Information 2020, 11, 110 8 of 38 neural network (BPNN) algorithm was applied to the extracted watermark image to minimize the distortion between the host image and the watermarked image.…”
Section: Techniques That Meet Requirements Simultaneouslymentioning
confidence: 99%
“…They first encrypt the watermark using FE then use DCT as the second method of encryption. Another study [7] proposed using several different watermarking techniques to secure the data content over unsecured communication channels and framework. They aim to ensure relevant content such as e-voting, passport and other valuable credential to receive and send content securely.…”
Section: Related Literaturementioning
confidence: 99%
“…Therefore, addressing these challenges has been an interesting problem for researchers in the field. One such effort that has been attracting interest is based on multimedia data hiding, which is a technique to hide multimedia data into a cover message without creating any perceptual distortion of the cover for identification, annotation and copyright (Singh et al 2018;Mohanty et al 2017). In recent years, multimedia data hiding techniques develops very fast and applies to many applications, such as E-health, military, communication, privacy protection, identification, media file archiving, broadcast monitoring, hardware and chip level security, remote education and insurance companies, secured E-voting systems, fingerprinting, real time audio/video, robotics, rightful ownership of identity card and digital cinema (Singh et al 2017;Mohanty et al 2017).…”
Section: Introductionmentioning
confidence: 99%