Articles with "securing digital" as a keyword



Photo by markusspiske from unsplash

Dual watermarking: An approach for securing digital documents

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08314-5

Abstract: This paper presents a dual watermarking technique using discrete wavelet transform (DWT), singular value decomposition (SVD) and set partitioning in hierarchical tree (SPIHT). The method uses second level DWT to transform the host image in… read more here.

Keywords: watermarking approach; securing digital; approach securing; dual watermarking ... See more keywords
Photo by karishea from unsplash

Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges and Solutions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3169141

Abstract: With the faster maturity and stability of digitization, connectivity and edge technologies, the number of the Internet of Things (IoT) devices and sensors is flourishing fast in important junctions such as homes, hotels, hospitals, retail… read more here.

Keywords: ledger technologies; enabled iot; iot devices; digital ledger ... See more keywords