Screen Watermark: A Novel Approach in Detecting Digital Criminals
Abstract
Keywords
Screen Watermarking , Steganography , Data Theft , Malicious Insiders
References
- [1] R. Article, “Available Online at www.ijarcs.info Information Hiding - Steganography & Watermarking : A Comparative Study,” vol. 4, no. 4, pp. 165–171, 2013.
- [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding-a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999, doi:10.1109/5.771065.
- [3] A. D. Orebaugh, “Steganalysis: A Steganography Intrusion Detection System,” 2011, [Online]. Available: https://pdfs.semanticscholar.org/0d97/93a6f1a0aef431cebce1b06f37ca4bf99447.pdf
- [4] R. Gupta, S. Gupta, and A. Singhal, “Importance and Techniques of Information Hiding : A Review,” Int. J. Comput. Trends Technol., vol. 9, no. 5, pp. 260–265, Mar. 2014, doi:10.14445/22312803/IJCTT-V9P149.
- [5] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proc. 1st Int. Conf. Image Process., vol. 2, pp. 86–90 vol.2, 1994.
- [6] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Syst. J., vol. 35, no. 3.4, pp. 313–336, 1996, doi:10.1147/sj.353.0313.
- [7] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Process., vol. 66, pp. 385–403, 1998.
- [8] G. Caronni, “Assuring Ownership Rights for Digital Images,” 1995.
- [9] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, “Genetic watermarking based on transform-domain techniques,” Pattern Recognit., vol. 37, no. 3, pp. 555–565, 2004, doi:10.1016/j.patcog.2003.07.003.
- [10] T. K. M. Tsui, X.-P. Zhang, and D. Androutsos, “Color Image Watermarking Using Multidimensional Fourier Transforms,” IEEE Trans. Inf. Forensics Secur., vol. 3, pp. 16–28, 2008.
