From classical to soft computing based watermarking techniques: A comprehensive review
With evolution of digital technology, it is challenging to protect personal data from access
without consent. Digital watermarking conceals some information as watermark to protect …
without consent. Digital watermarking conceals some information as watermark to protect …
[HTML][HTML] Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video …
SD Mali, L Agilandeeswari - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the development of multimedia processing approaches along with the Internet leads to
various issues, like data tampering, data piracy, and illicit dissemination. The quick …
various issues, like data tampering, data piracy, and illicit dissemination. The quick …
Energy efficient multi-criterion binary grey wolf optimizer based clustering for heterogeneous wireless sensor networks
Wireless sensor networks are constrained by limited energy resources of sensor nodes,
which limits the efficiency and lifetime of the network. Clustering is a widely adopted strategy …
which limits the efficiency and lifetime of the network. Clustering is a widely adopted strategy …
A novel dynamic image watermarking technique with features inspired by quantum computing principles
R Gorle, A Guttavelli - AIP Advances, 2024 - pubs.aip.org
This research proposes a novel dynamic image watermarking technique with features
inspired by quantum computing principles. This method encodes binary values into qubits …
inspired by quantum computing principles. This method encodes binary values into qubits …
Securing color video when transmitting through communication channels using DT-CWT-Based watermarking
R Alkanhel, HA Abdallah - Electronics, 2022 - mdpi.com
In this paper, a color video watermarking system based on SVD in the complex wavelet
domain is proposed. The process of inserting copyright information in video bit streams is …
domain is proposed. The process of inserting copyright information in video bit streams is …
The blind robust video watermarking scheme in video surveillance context
Video surveillance systems are now commonly deployed in both public and private settings
globally. Use of watermarking in the surveillance systems is emerging as one of the …
globally. Use of watermarking in the surveillance systems is emerging as one of the …
Histogram algorithm and its circuit design based on parallel computing for quantum video
Q Zhang, D Lu, Y Hu, M Xu - Multimedia Tools and Applications, 2024 - Springer
Quantum image histogram as a preprocessing result in quantum image processing contains
the gray information of the image and plays an important role in subsequent image …
the gray information of the image and plays an important role in subsequent image …
[PDF][PDF] A Dual Domain Robust Reversible Watermarking Algorithm for Frame Grouping Videos Using Scene Smoothness.
Y Liang, K Niu, Y Zhang, Y Meng - Computers, Materials & …, 2024 - cdn.techscience.cn
The proposed robust reversible watermarking algorithm addresses the compatibility
challenges between robustness and reversibility in existing video watermarking techniques …
challenges between robustness and reversibility in existing video watermarking techniques …
DS-AT: An efficient watermarking technique based on Arnold transform in DCT and SVD domain
The researchers have a difficult task in preserving the trade-off between robustness and
imperceptibility. To address this problem, this paper presents a discrete cosine transform …
imperceptibility. To address this problem, this paper presents a discrete cosine transform …
Review of Modern Symmetric and Asymmetric Cryptographic Techniques
A Bhatia, N Naveen - Intelligent Data Analytics, IoT, and …, 2023 - taylorfrancis.com
The increasing interchange of data over the internet has bought information security to the
forefront. Understanding how to secure sensitive information is critical now that data are …
forefront. Understanding how to secure sensitive information is critical now that data are …