An extensive review of hyperspectral image classification and prediction: techniques and challenges

G Tejasree, L Agilandeeswari - Multimedia Tools and Applications, 2024 - Springer
Abstract Hyperspectral Image Processing (HSIP) is an essential technique in remote
sensing. Currently, extensive research is carried out in hyperspectral image processing …

Semi-Blind watermarking using convolutional attention-based turtle shell matrix for tamper detection and recovery of medical images

A Palani, A Loganathan - Expert Systems with Applications, 2024 - Elsevier
Abstract “Telemedicine or e-medicine” refers to an electronic communication system that
shares medical information from one location to another through the transmission channel …

[HTML][HTML] Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video …

SD Mali, L Agilandeeswari - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the development of multimedia processing approaches along with the Internet leads to
various issues, like data tampering, data piracy, and illicit dissemination. The quick …

Neural networks-based data hiding in digital images: overview

K Dzhanashia, O Evsutin - Neurocomputing, 2024 - Elsevier
Nowadays, neural networks are actively used for data hiding; however, there is currently no
systematic knowledge regarding their utilization in this field. This is a significant gap …

[HTML][HTML] Land use/land cover (LULC) classification using deep-LSTM for hyperspectral images

G Tejasree, L Agilandeeswari - The Egyptian Journal of Remote Sensing …, 2024 - Elsevier
Abstract Land Use/Land Cover (LULC) classification using hyperspectral images in remote
sensing is a leading technology. However, LULC classification using hyperspectral images …

Optimal semi-fragile watermarking based on maximum entropy random walk and swin transformer for tamper localization

P Aberna, L Agilandeeswari - IEEE Access, 2024 - ieeexplore.ieee.org
In the multimedia arena, image tampering is an uncontrollable process that necessitates
content authentication and tamper detection in a variety of applications. One method that is …

High-quality evaluation for invisible watermarking based on discrete cosine transform (dct) and singular value decomposition (svd)

EA Sofyan, CA Sari, EH Rachmawanto… - Advance Sustainable …, 2024 - journal.upgris.ac.id
In this research, we propose an innovative approach that integrates Discrete Cosine
Transform (DCT) and Singular Value Decomposition (SVD) to enhance the quality and …

A secure multi-party hybrid encryption sharing scheme with a new 2D sine-cosine chaotic system and compressed sensing

F Ma, L Wu, Y Ye, F Zhang - Nonlinear Dynamics, 2024 - Springer
Aiming at the problem that the security and fraud of sensitive image transmission on public
channel, a secure multi-party hybrid encryption-sharing scheme which combines a novel 2D …

[HTML][HTML] Trade-off independent image watermarking using enhanced structured matrix decomposition

A Khan, KS Wong, VM Baskaran - Multimedia Tools and Applications, 2024 - Springer
Image watermarking plays a vital role in providing protection from copyright violation.
However, conventional watermarking techniques typically exhibit trade-offs in terms of …

A Visually Meaningful Color-Video Encryption Scheme That Combines Frame Channel Fusion and a Chaotic System

D An, D Hao, J Lu, S Zhang, J Zhang - Electronics, 2024 - mdpi.com
Compared to text and images, video can show information more vividly and intuitively via a
moving picture; therefore, video is widely used in all walks of life. However, videos uploaded …