Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations
Fuzzy sets and fuzzy logic: theory and applications
Fuzzy sets and fuzzy logic: theory and applications
Machine Learning
Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers by Lotfi A. Zadeh
Fuzzy sets, fuzzy logic, and fuzzy systems: selected papers by Lotfi A. Zadeh
Watermarking algorithm based on a human visual model
Signal Processing
Neural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
Introduction to Bayesian Networks
Introduction to Bayesian Networks
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
An Efficient Protocol for Authenticated Key Agreement
Designs, Codes and Cryptography
Integration of digital rights management into the internet open trading protocol
Decision Support Systems
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Proceedings of the First International Workshop on Information Hiding
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Pattern Recognition and Machine Learning (Information Science and Statistics)
Pattern Recognition and Machine Learning (Information Science and Statistics)
The use of digital watermarking for intelligence multimedia document distribution
Journal of Theoretical and Applied Electronic Commerce Research
Intellectual Property Protection for Multimedia Information Technology
Intellectual Property Protection for Multimedia Information Technology
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Alerts in mobile healthcare applications: requirements and pilot study
IEEE Transactions on Information Technology in Biomedicine
Hi-index | 0.00 |
The Service-Oriented Architecture SOA demands supportive technologies and new requirements for mobile collaboration across multiple platforms. One of its representative solutions is intelligent information security of enterprise resources for collaboration systems and services. Digital watermarking became a key technology for protecting copyrights. In this article, the authors propose a method of key generation scheme for static visual digital watermarking by using machine learning technology, neural network as its exemplary approach for machine learning method. The proposed method is to provide intelligent mobile collaboration with secure data transactions using machine learning approaches, herein neural network approach as an exemplary technology. First, the proposed method of key generation is to extract certain type of bit patterns in the forms of visual features out of visual objects or data as training data set for machine learning of digital watermark. Second, the proposed method of watermark extraction is processed by presenting visual features of the target visual image into extraction key or herein is a classifier generated in advance by the training approach of machine learning technology. Third, the training approach is to generate the extraction key, which is conditioned to generate watermark signal patterns, only if proper visual features are presented to the classifier. In the proposed method, this classifier which is generated by the machine learning process is used as watermark extraction key. The proposed method is to contribute to secure visual information hiding without losing any detailed data of visual objects or any additional resources of hiding visual objects as molds to embed hidden visual objects. In the experiments, they have shown that our proposed method is robust to high pass filtering and JPEG compression. The proposed method is limited in its applications on the positions of the feature sub-blocks, especially on geometric attacks like shrinking or rotation of the image.