A review of image watermarking for identity protection and verification

S Sharma, JJ Zou, G Fang, P Shukla, W Cai - Multimedia Tools and …, 2024 - Springer
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …

SecDH: Security of COVID-19 images based on data hiding with PCA

OP Singh, AK Singh, AK Agrawal, H Zhou - Computer Communications, 2022 - Elsevier
Nowadays, image security and copyright protection become challenging, especially after the
COVID-19 pandemic. In the paper, we develop SecDH as a medical data hiding scheme …

Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media

KJ Devi, P Singh, HK Thakkar, N Kumar - Applied Soft Computing, 2022 - Elsevier
Widespread transmission of digital image in social media has come up with security,
confidentiality and authentication issues. Ensuring copyright protection of digital images …

WSOmark: An adaptive dual-purpose color image watermarking using white shark optimizer and Levenberg–Marquardt BPNN

S Kumar, NK Sharma, N Kumar - Expert Systems with Applications, 2023 - Elsevier
With the rapid progression in Internet technologies, content authentication and copyright
concerns have increased exponentially. To overcome these challenges, this paper proposes …

Robust periodic blind watermarking based on sub-block mapping and block encryption

J Wang, D Wu, L Li, J Zhao, H Wu, Y Tang - Expert Systems with …, 2023 - Elsevier
Digital watermarking is of critical importance in multimedia copyright protection. However,
with the development of Internet technologies, the combined attacks of complex …

A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities

S Sharma, JJ Zou, G Fang - IEEE Access, 2022 - ieeexplore.ieee.org
Technologies that fall under the umbrella of Industry 4.0 can be classified into one of its four
significant components: cyber-physical systems, the internet of things (IoT), on-demand …

ROSEmark: Robust semi-blind ECG watermarking scheme using SWT-DCT framework

S Kumar, A Rajpal, NK Sharma, S Rajpal… - Digital Signal …, 2022 - Elsevier
Coronary heart disease is a major cause of fatality worldwide. Online access to a patient's
ECG record on networked hand-held devices enables its timely assessment by a …

A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion

J Ouyang, J Huang, X Wen, Z Shao - Multimedia Tools and Applications, 2023 - Springer
Accurate tamper localization is one of the most challenging problems in semi-fragile
watermarking authentication schemes. The existing semi-fragile watermarking methods …

A semi-fragile reversible watermarking method based on qdft and tamper ranking

J Ouyang, J Huang, X Wen - Multimedia Tools and Applications, 2024 - Springer
The traditional semi-fragile watermarking can effectively protect the integrity of the host
image, but the permanent distortion caused by watermark embedding makes the application …

A zero-watermarking scheme based on spatial topological relations for vector dataset

N Ren, S Guo, C Zhu, Y Hu - Expert Systems with Applications, 2023 - Elsevier
Zero-watermarking technology uses the important features of the original data itself to
construct watermark information. In the process of watermark construction, no modification is …