Keywords = hash function
Number of Articles: 6
Copyright Protection Service for Mobile Images
Volume 34, Issue 4 , April 2016, , Page 444-450
AbstractThis paper presents a watermarking protocol that is used for protecting any digital image and working as a copyright registration for any important image to any user who feels his/her ... Read More ...
Hybrid Techniques for Proposed Intelligent Digital Image Watermarking
Volume 33, Issue 4 , April 2015, , Page 702-713
AbstractDigital watermarking provides a solution of the recent problems such as a copyright protection and digital content authentication, as well as the balancing between the copyright protection ... Read More ...
Proposed Digital Signature Using One Time Pad
Volume 31, 2 B , February 2013, , Page 261-275
AbstractAuthentication protects two parties from the third party, but not protect against each other. Digital signature verification of the message source, protects the authority from anyone. ... Read More ...
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function
Volume 29, Issue 16 , December 2011, , Page 3291-3301
AbstractInternet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free ... Read More ...
Watermarking for Relational Database by using Threshold Generator
Volume 29, Issue 1 , January 2011, , Page 33-43
AbstractProviding ownership on relational database is a crucial issue in today internet-based application environments and in many content distribution applications.This paper provides the ... Read More ...
Generate Random Image-Key using Hash Technique
Volume 28, Issue 2 , January 2010, , Page 382-398