Bio inspired computing–a review of algorithms and scope of applications

AK Kar - Expert Systems with Applications, 2016 - Elsevier
With the explosion of data generation, getting optimal solutions to data driven problems is
increasingly becoming a challenge, if not impossible. It is increasingly being recognised that …

Swarm intelligence: A review of algorithms

A Chakraborty, AK Kar - … -inspired computing and optimization: Theory and …, 2017 - Springer
Swarm intelligence (SI), an integral part in the field of artificial intelligence, is gradually
gaining prominence, as more and more high complexity problems require solutions which …

[PDF][PDF] Watermarking System for Medical Images Using Optimization Algorithm

M Saber, ESM El-Kenawy, A Ibrahim… - Fusion: Practice & …, 2023 - researchgate.net
One of the main methods used to provide security for medical records when exchanging
these records through open networks is digital watermarking. In order to preserve the …

An intelligent and blind dual color image watermarking for authentication and copyright protection

SBB Ahmadi, G Zhang, M Rabbani, L Boukela… - Applied …, 2021 - Springer
In this paper, a blind dual watermarking scheme for color images is proposed by embedding
an invisible robust watermark to protect copyright, as well as a fragile watermark is …

An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine

K Swaraja, K Meenakshi, P Kora - Biomedical Signal Processing and …, 2020 - Elsevier
Maintaining secured patient credentials in telemedicine is becoming a critical task. Image
watermarking is one of the solutions to this problem. It is extensively used to protect and …

Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking

ESM El-Kenawy, N Khodadadi, A Khoshnaw… - Applied Sciences, 2022 - mdpi.com
Recently, piracy and copyright violations of digital content have become major concerns as
computer science has advanced. In order to prevent unauthorized usage of content, digital …

An optimized image watermarking method based on HD and SVD in DWT domain

J Liu, J Huang, Y Luo, L Cao, S Yang, D Wei… - IEEE …, 2019 - ieeexplore.ieee.org
In this paper, a novel image watermarking method is proposed which is based on discrete
wave transformation (DWT), Hessenberg decomposition (HD), and singular value …

Secure video communication using firefly optimization and visual cryptography

M Kumar, J Aggarwal, A Rani, T Stephan… - Artificial Intelligence …, 2022 - Springer
In recent years, we face an increasing interest in protecting multimedia data and copyrights
due to the high exchange of information. Attackers are trying to get confidential information …

Hybrid SVD-based image watermarking schemes: a review

Z Zainol, JS Teh, M Alawida, A Alabdulatif - IEEE Access, 2021 - ieeexplore.ieee.org
Watermarking is an important technique for protecting sensitive e-multimedia data and
intellectual property. Watermarking techniques are used for many applications such as …

Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain

YM Li, D Wei, L Zhang - Information Sciences, 2021 - Elsevier
The existing watermarking algorithms invariant wavelet domain are weak at resisting
geometric attacks and have small embedding capacities. In this paper, a robust double …