A review of image watermarking for identity protection and verification
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …
SecDH: Security of COVID-19 images based on data hiding with PCA
Nowadays, image security and copyright protection become challenging, especially after the
COVID-19 pandemic. In the paper, we develop SecDH as a medical data hiding scheme …
COVID-19 pandemic. In the paper, we develop SecDH as a medical data hiding scheme …
Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media
Widespread transmission of digital image in social media has come up with security,
confidentiality and authentication issues. Ensuring copyright protection of digital images …
confidentiality and authentication issues. Ensuring copyright protection of digital images …
WSOmark: An adaptive dual-purpose color image watermarking using white shark optimizer and Levenberg–Marquardt BPNN
With the rapid progression in Internet technologies, content authentication and copyright
concerns have increased exponentially. To overcome these challenges, this paper proposes …
concerns have increased exponentially. To overcome these challenges, this paper proposes …
Robust periodic blind watermarking based on sub-block mapping and block encryption
Digital watermarking is of critical importance in multimedia copyright protection. However,
with the development of Internet technologies, the combined attacks of complex …
with the development of Internet technologies, the combined attacks of complex …
A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities
Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four
significant components: cyber-physical systems, the internet of things (IoT), on-demand …
significant components: cyber-physical systems, the internet of things (IoT), on-demand …
ROSEmark: Robust semi-blind ECG watermarking scheme using SWT-DCT framework
Coronary heart disease is a major cause of fatality worldwide. Online access to a patient's
ECG record on networked hand-held devices enables its timely assessment by a …
ECG record on networked hand-held devices enables its timely assessment by a …
A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion
J Ouyang, J Huang, X Wen, Z Shao - Multimedia Tools and Applications, 2023 - Springer
Accurate tamper localization is one of the most challenging problems in semi-fragile
watermarking authentication schemes. The existing semi-fragile watermarking methods …
watermarking authentication schemes. The existing semi-fragile watermarking methods …
A semi-fragile reversible watermarking method based on qdft and tamper ranking
J Ouyang, J Huang, X Wen - Multimedia Tools and Applications, 2024 - Springer
The traditional semi-fragile watermarking can effectively protect the integrity of the host
image, but the permanent distortion caused by watermark embedding makes the application …
image, but the permanent distortion caused by watermark embedding makes the application …
A zero-watermarking scheme based on spatial topological relations for vector dataset
N Ren, S Guo, C Zhu, Y Hu - Expert Systems with Applications, 2023 - Elsevier
Zero-watermarking technology uses the important features of the original data itself to
construct watermark information. In the process of watermark construction, no modification is …
construct watermark information. In the process of watermark construction, no modification is …