Bio inspired computing–a review of algorithms and scope of applications
AK Kar - Expert Systems with Applications, 2016 - Elsevier
With the explosion of data generation, getting optimal solutions to data driven problems is
increasingly becoming a challenge, if not impossible. It is increasingly being recognised that …
increasingly becoming a challenge, if not impossible. It is increasingly being recognised that …
Swarm intelligence: A review of algorithms
A Chakraborty, AK Kar - … -inspired computing and optimization: Theory and …, 2017 - Springer
Swarm intelligence (SI), an integral part in the field of artificial intelligence, is gradually
gaining prominence, as more and more high complexity problems require solutions which …
gaining prominence, as more and more high complexity problems require solutions which …
[PDF][PDF] Watermarking System for Medical Images Using Optimization Algorithm
One of the main methods used to provide security for medical records when exchanging
these records through open networks is digital watermarking. In order to preserve the …
these records through open networks is digital watermarking. In order to preserve the …
An intelligent and blind dual color image watermarking for authentication and copyright protection
In this paper, a blind dual watermarking scheme for color images is proposed by embedding
an invisible robust watermark to protect copyright, as well as a fragile watermark is …
an invisible robust watermark to protect copyright, as well as a fragile watermark is …
An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine
K Swaraja, K Meenakshi, P Kora - Biomedical Signal Processing and …, 2020 - Elsevier
Maintaining secured patient credentials in telemedicine is becoming a critical task. Image
watermarking is one of the solutions to this problem. It is extensively used to protect and …
watermarking is one of the solutions to this problem. It is extensively used to protect and …
Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking
Recently, piracy and copyright violations of digital content have become major concerns as
computer science has advanced. In order to prevent unauthorized usage of content, digital …
computer science has advanced. In order to prevent unauthorized usage of content, digital …
An optimized image watermarking method based on HD and SVD in DWT domain
In this paper, a novel image watermarking method is proposed which is based on discrete
wave transformation (DWT), Hessenberg decomposition (HD), and singular value …
wave transformation (DWT), Hessenberg decomposition (HD), and singular value …
Secure video communication using firefly optimization and visual cryptography
In recent years, we face an increasing interest in protecting multimedia data and copyrights
due to the high exchange of information. Attackers are trying to get confidential information …
due to the high exchange of information. Attackers are trying to get confidential information …
Hybrid SVD-based image watermarking schemes: a review
Watermarking is an important technique for protecting sensitive e-multimedia data and
intellectual property. Watermarking techniques are used for many applications such as …
intellectual property. Watermarking techniques are used for many applications such as …
Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain
YM Li, D Wei, L Zhang - Information Sciences, 2021 - Elsevier
The existing watermarking algorithms invariant wavelet domain are weak at resisting
geometric attacks and have small embedding capacities. In this paper, a robust double …
geometric attacks and have small embedding capacities. In this paper, a robust double …