Authenticate audio video-crypto invisible watermarking approach for enhancing hidden information security and robustness.
Mahesh GangardeShruti OzaJanardhan ChitodePublished in: Int. J. Electron. Secur. Digit. Forensics (2020)
Keyphrases
- information security
- audio video
- security issues
- multimedia
- information systems
- network security
- smart card
- information security management
- intrusion detection
- cyber defense
- user authentication
- security level
- security requirements
- digital images
- e government
- watermarking scheme
- anomaly detection
- online video
- watermarking algorithm
- user interaction
- data hiding
- multi party
- streaming services
- knowledge discovery
- information technology