12,489 results on '"Watermark"'
Search Results
2. AdMarks: Image Steganography Based on Adversarial Perturbation
- Author
-
Ding, Ye, Shao, Mingyu, Wang, Jie, Wan, Qi, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Cai, Zhipeng, editor, Takabi, Daniel, editor, Guo, Shaoyong, editor, and Zou, Yifei, editor
- Published
- 2025
- Full Text
- View/download PDF
3. WATERMARKING SCHEME BASED ON MOST SIGNIFICANT BIT FOR PUBLIC COPYRIGHT PROTECTION FOR RELATIONAL DATABASES
- Author
-
Luu Thi Bich Huong
- Subjects
public copyright protection ,watermark ,relation database ,Technology ,Social sciences (General) ,H1-99 - Abstract
The paper presents a watermarked scheme based on the most significant bit for public copyright protection for relational databases. A Watermark scheme could openly prove data copyright as often as desired. This watermark scheme is stable against common attacks such as adding, editing, and deleting data values randomly or selectively.
- Published
- 2024
- Full Text
- View/download PDF
4. «God is Silent, Venice Remains». Aesthetic Perspectives on Dwelling and Literary Traversal of Venetian Space.
- Author
-
Bottero, Stefano
- Subjects
URBAN studies ,THEMATIC analysis ,AESTHETICS ,DWELLINGS ,GOD - Abstract
The article explores the concepts of transit and dwelling within the urban spatiality of Venice through literary analysis. It begins with an examination of Josif Brodskij's Watermark, followed by an exploration of Guido Ceronetti's philosophical perspective as presented in Un viaggio in Italia. By adopting a critical-philosophical approach, the analysis delves into the thematic and aesthetic elements of both texts, grounded in the authors' viewpoints. The article then discusses comparative aspects, preceded by an overview of relevant theoretical frameworks. Through a focus on the creative processes of the works, a shared philosophical alignment is highlighted. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Dual image watermarking based on NSST-LWT-DCT for color image.
- Author
-
Avivah, Siti Nur, Ernawan, Ferda, and Raffei, Anis Farihan Mat
- Subjects
DIGITAL watermarking ,COLOR image processing ,WATERMARKS ,DISCRETE cosine transforms ,SINGULAR value decomposition ,COPYRIGHT ,WAVELET transforms ,DIGITAL images - Abstract
Advanced internet technology allows unauthorized individuals to modify and distribute digital images. Image watermarking is a popular solution for copyright protection and ensuring digital security. This research presents an embedding scheme with a set of conditions using non-subsampled Shearlet transform (NSST), lifting wavelet transform (LWT), and discrete cosine transform (DCT). Red and green channels are employed for the embedding process. The red channel is converted by NSST-LWT. The low-frequency area (LL) frequency is then split into small blocks of 8×8, each partition block is then transformed by DCT. The DCT coefficient of (3,4), (5,2), (5,3), (3,5), called matrix M1, and (2,5), (4,3), (6,2), (4,4), called matrix M2 are selected for singular value decomposition (SVD) process. With a set of conditions, the watermark bits are incorporated into those singular values. The green channel is cropped to get the center image before splitting into 4×4 pixels. The block components are then selected based on the least entropy value for the embedding regions. The selected blocks are then computed using LWT-SVD. A set of conditions for U(1,1) and U(2,1) are used to incorporate the watermark logo. The experimental findings reveal that the suggested scheme achieves high imperceptibility and resilience under various evaluating attacks with an average peak signal-to-noise ratio (PSNR) and correlation value (NC) values are up to 43.89 dB and 0.96, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Cryptanalysis of Two Correlation-Based Digital Watermarking Schemes in DCT Domain
- Author
-
Sanyal, Namrata, Sengupta, Nilesh, Das, Soumik, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Giri, Debasis, editor, Das, Swagatam, editor, Corchado Rodríguez, Juan Manuel, editor, and De, Debashis, editor
- Published
- 2024
- Full Text
- View/download PDF
7. Certifiably Robust Image Watermark
- Author
-
Jiang, Zhengyuan, Guo, Moyang, Hu, Yuepeng, Jia, Jinyuan, Gong, Neil Zhenqiang, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Leonardis, Aleš, editor, Ricci, Elisa, editor, Roth, Stefan, editor, Russakovsky, Olga, editor, Sattler, Torsten, editor, and Varol, Gül, editor
- Published
- 2024
- Full Text
- View/download PDF
8. Watermark Intensity Effect on Robustness and Imperceptibility of Medical Images
- Author
-
Chaudhary, Himanshi, Vishwakarma, Virendra P., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Swaroop, Abhishek, editor, Kansal, Vineet, editor, Fortino, Giancarlo, editor, and Hassanien, Aboul Ella, editor
- Published
- 2024
- Full Text
- View/download PDF
9. FRFT Domain Watermarking Algorithm Based on GA Adaptive Optimization
- Author
-
Du, Qiaoqiao, Zhao, Yanchen, Hao, Weijie, Zhang, Wenyin, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Huang, De-Shuang, editor, Zhang, Chuanlei, editor, and Zhang, Qinhu, editor
- Published
- 2024
- Full Text
- View/download PDF
10. Intellectual Property Protection of Image Processing Models with Watermarking
- Author
-
Du, Yuxuan, Tang, Linlin, Liao, Qing, Liu, Yang, Qi, Shuhan, Zhang, Jiajia, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Lin, Jerry Chun-Wei, editor, Shieh, Chin-Shiuh, editor, Horng, Mong-Fong, editor, and Chu, Shu-Chuan, editor
- Published
- 2024
- Full Text
- View/download PDF
11. A secure video data streaming model using modified firefly and SVD technique.
- Author
-
Muthulakshmi, K. and Valarmathi, K.
- Abstract
Due to the expression of sharing information, there has been an increase in interest in safeguarding multimedia information and copyrights in recent times. Attackers are attempting to obtain sensitive information from a variety of sources, emphasizing the significance of data security. Singular value decomposition (SVD) is used to ensure data confidentiality and authenticity, and several researchers used strategies to obscure hidden information. The false-positive error problem of SVD is diminished due to the presence of an embedded watermark image and there is no possibility of counterfeit. By integrating with discrete wavelet transform (DWT), the performance is improved as well as the error is minimized. The secure watermarks has been hidden based on singular value decomposition discrete wavelet transform for 2 dimension (SVD-DWT2D). Then this secure watermark symbols are analysed using reversible data concealing alongside other watermarking techniques which are used frequently for securing the data privacy. The best threshold value is determined for evaluating the originality and the complicated frames are selected after the testing process. The video quality is predicted based on the threshold value. The UCF101 dataset is determined to validate the efficiency of the proposed method and, thus, enhanced the video quality. The proposed method achieves greater ability and video quality of 69db PSNR value and 0.362 MSE value, respectively. Based on the experimental analysis the proposed SVD-DWT2D based reversible data concealing model attained optimal results in securing the digital video by incorporating featured watermarks in the video sequence. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Robust Image Watermarking Based on Lifting Wavelet Transfrom-Hessenberg Decomposition for Copyright Protection
- Author
-
Agung Sudrajat, Ferda Ernawan, and Agit Amrullah
- Subjects
watermark ,copyright protection ,image watermarking ,hessenberg decomposition ,lifting wavelet transform ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The modern internet technology enables unauthorized individuals to alter the content of digital images. This work introduces a method for enhancing the robustness of an embedded watermark in images using Lifting Wavelet Transform (LWT) and Hessenberg Decomposition. This study utilizes Hessenberg Decomposition (HD) to insert a watermark image into the LL-sub band of the LWT transform. Singular Value Decomposition (SVD) is employed to convert the H value of HD. Subsequently, the watermark image is put into the singular value. The suggested system underwent testing against a range of image processing assaults, including compression, filters, and noise additions. The testing was conducted using multiple watermark sizes, specifically 256×256, 128×128, and 64×64 pixels. The experimental results demonstrate exceptional imperceptibility, with an average PSNR value of 39.5640 dB and a SSIM value of 0.9993. The results demonstrate a high level of resilience, as indicated by the NC value of 0.96390.
- Published
- 2024
- Full Text
- View/download PDF
13. Neutrosophic Similarity Measure for Assessing Digital Watermarked Images
- Author
-
Taha Basheer Taha and Huda E. Khalid
- Subjects
digital image assessment ,watermark ,neutrosophic similarity measure ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Digital watermarking is an essential tool for numerous applications, and the quality of watermarked images must be assessed using accurate criteria. Peak Signal-to-Noise Ratio (PSNR), a widely used image assessment metric, has limits when evaluating images containing noise, such as watermarks. To tackle such kind of issues this, this study investigates a different assessment metric, the Neutrosophic Similarity Measure, and assesses its performance in evaluating watermarked images when compared to PSNR. Similarities to ascertain whether the neutrosophic similarity Measure has a higher noise tolerance and offers a more accurate evaluation of watermarked images. The results show that Neutrosophic Similarity Measure overcomes PSNR in capturing the influence of additive watermarks and demonstrating superior noise tolerance through experimental evaluation on a dataset of watermarked images. These findings highlight the possibility of adopting new assessment metric, such as neutrosophic similarity measure, for assessing watermarked images, thereby enhancing the effectiveness of evaluating watermarked Images.
- Published
- 2023
- Full Text
- View/download PDF
14. 基于智能进化算法的可见水印对抗攻击.
- Author
-
季俊豪, 张玉书, 赵若宇, 温文媖, and 董 理
- Abstract
With the increasing awareness of citizen copyright, more and more images containing watermarks are appearing in daily life. However, existing research shows that images with watermarks can cause neural network misclassification, posing a significant threat to the popularization and application of neural networks. Adversarial training is one of the defensive methods to solve this problem, but it requires a large number of watermark adversarial samples as training data. To address this issue, this paper proposes a visible watermark adversarial attack method based on intelligent evolutionary algorithm to generate high-intensity watermark adversarial samples. This method can not only quickly generate watermark adversarial samples, but also maximize the attack on the neural network. In addition, this method incorporates image quality evaluation metrics to constrain the visual loss of the image, making the watermark adversarial samples more visually appealing. The comprehensive experimental results show that the proposed method has lower time complexity than the benchmark watermark attack method, and has a higher attack rate on neural networks compared to the benchmark black box attack. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. A Robust DCT-Based Scheme for Watermarking Deep Neural Networks.
- Author
-
Baziyad, Mohammed, Kamel, Ibrahim, Rabie, Tamer, and Kabatyansky, Grigory
- Subjects
ARTIFICIAL neural networks ,DIGITAL watermarking ,DISCRETE cosine transforms ,PRIVATE security services ,WATERMARKS - Abstract
This paper proposes a new robust scheme to provide copy protection services to Deep Nural Network (DNN) models using digital watermarks. The rationale of the proposed technique is that robustness can be achieved by embedding a large watermark that can span the whole watermark. If an adversary attempts to destroy the watermark, he will end up destroying the DNN model. However, maximizing the embedding capacity will strongly degrade the performance of the DNN model. To control the performance-capacity-robustness trade-of, the proposed scheme utilizes the Discrete Cosine Transform (DCT) due to its strong compaction property, which becomes even stronger when applied to correlated segments of data. Therefore, the proposed technique extracts the DNN weights and groups them within correlated segments before applying the DCT. The experimental results have proven the effectiveness of the proposed DNN watermarking scheme as it was able to embed 1.73 Mb of data with only a 1.4% drop in the classification accuracy of a standard Residual Neural Network with 21 Convolutional layers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. An adaptive watermarking for remote sensing images based on maximum entropy and discrete wavelet transformatio.
- Author
-
Yang Hua, Xu Xi, Chengyi Qu, Jinglong Du, Maofeng Weng, and Bao Ye
- Abstract
Most frequency-domain remote sensing image watermarking algorithms embed watermarks at random locations, which have negative impact on the watermark invisibility. In this study, we propose an adaptive watermarking scheme for remote sensing images that considers the information complexity to select where to embed watermarks to improve watermark invisibility without affecting algorithm robustness. The scheme converts remote sensing images from RGB to YCbCr color space, performs two-level DWT on luminance YY, and selects the high frequency coefficient of the low frequency component (HH
2 Y ) as the watermark embedding domain. To achieve adaptive embedding, HH2 Y is divided into several 8*8 blocks, the entropy of each sub-block is calculated, and the block with the maximum entropy is chosen as the watermark embedding location. During embedding phase, the watermark image is also decomposed by two-level DWT, and the resulting high frequency coefficient (HH2 W ) is then embedded into the block with maximum entropy using α- blending. The experimental results show that the watermarked remote sensing images have high fidelity, indicating good invisibility. Under varying degrees of geometric, cropping, filtering, and noise attacks, the proposed watermarking can always extract high identifiable watermark images. Moreover, it is extremely stable and impervious to attack intensity interference. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
17. Secure Digital Image Watermarking using Fibonacci Scrambling and Rotational Embedding.
- Author
-
Sharma, Aditi and Awasthi, Sateesh Kumar
- Subjects
DIGITAL image watermarking ,DIGITAL images ,DISCRETE cosine transforms ,DIGITAL watermarking ,IMAGE intensifiers ,DISCRETE wavelet transforms - Abstract
Present age is the age of technology where we are all flooded with digital data. As the use of data is increasing day by day, the techniques and algorithms for data manipulation are also increasing at a rapid rate. The advancement in technology has brought about a revolution which has led to identification of various ways and techniques for modification and enhancement of images. On the other hand it also brings various challenges with respect to the prevention of tampering, forging or misuse of electronic data in form of image, audio or video. Digital watermarking can prove to be a very useful technique in prevention of any such scenario. Verifying the integrity of delicate images, such as medical photos, is crucial since even the smallest distortion or alteration might lead to a wrong diagnosis. Especially in digital images, watermarking techniques give protection from any such attack to a large extent. This research paper proposes a novel approach to digital image watermarking using a combination of Fibonacci scrambling, rotational embedding, and the Discrete Cosine Transform (DCT). The objective of the proposed algorithm is to bolster the security and resilience of the watermarking process through the incorporation of supplementary encryption and obfuscation mechanisms. We have implemented the code for this algorithm in Python. [ABSTRACT FROM AUTHOR]
- Published
- 2024
18. A robust blockchain-based watermarking using edge detection and wavelet transform
- Author
-
Mannepalli, Praveen Kumar, Richhariya, Vineet, Gupta, Susheel Kumar, Shukla, Piyush Kumar, Dutta, Pushan Kumar, Chowdhury, Subrata, and Hu, Yu-Chen
- Published
- 2024
- Full Text
- View/download PDF
19. Deep Serial Number: Computational Watermark for DNN Intellectual Property Protection
- Author
-
Tang, Ruixiang, Du, Mengnan, Hu, Xia, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, De Francisci Morales, Gianmarco, editor, Perlich, Claudia, editor, Ruchansky, Natali, editor, Kourtellis, Nicolas, editor, Baralis, Elena, editor, and Bonchi, Francesco, editor
- Published
- 2023
- Full Text
- View/download PDF
20. A Comparative Analysis of Various Techniques of Data Leakage Detection in Different Domains
- Author
-
Patil, Kiran, Sonune, Harsha, Devikar, Soniya, Chaudhari, Vrushali, Ayachit, Isha, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Fong, Simon, editor, Dey, Nilanjan, editor, and Joshi, Amit, editor
- Published
- 2023
- Full Text
- View/download PDF
21. The Watermark Imaging System: Revealing the Internal Structure of Historical Papers
- Author
-
Elisa Ou, Paul Messier, Ruixue Lian, Andrew Messier, and William Sethares
- Subjects
watermark ,chain line ,image registration ,image stack ,raking light ,transmitted light ,Archaeology ,CC1-960 - Abstract
This paper introduces the Watermark Imaging System (WImSy) which can be used to photograph, document, and study sheets of paper. The WImSy provides surface images, raking light images, and transmitted light images of the paper, all in perfect alignment. We develop algorithms that exploit this alignment by combining several images together in a process that mimics both the “surface image removal” technique and the method of “high dynamic range” photographs. An improved optimization criterion and an automatic parameter selection procedure streamline the process and make it practical for art historians and conservators to extract the relevant information to study watermarks. The effectiveness of the method is demonstrated in several experiments on images taken with the WImSy at the Metropolitan Museum of Art in New York and at the Getty Museum in Los Angeles, and the results are compared with manually optimized images.
- Published
- 2023
- Full Text
- View/download PDF
22. A chaotic-based watermarking scheme for ensuring integrity of a face recognition system in public large gathering scenario
- Author
-
Basil Saud Alhazmi, Oussama Benrhouma, Adnan Nadeem AlHassan, Muhammad Ashraf, and Saad Said Alqahtany
- Subjects
Watermark ,Least Significant Bits (LSBs) ,Face detection ,Chaotic systems ,Tamper detection ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Secure data transmission is critical in public video surveillance applications such as tracking missing persons in large crowd gatherings. It may help the security personnel to monitor & record the live feeds from multiple cameras. However, this live streaming could be falsified. Various cryptographic techniques have been proposed to ensure the integrity of transmitted images, but continuous attacks still pose serious challenges to ensuring the integrity and authenticity of transmitted images. This work proposes a new chaotic-based watermarking technique to ensure the integrity of the transmitted video frames, and since the frames come from multiple cameras, the scheme should be as simple as possible and as fast as possible, the simplicity manifests in designing a fragile watermarking scheme therefore, the watermark is to be embedded in the spatial domain by direct manipulation of the values of the cover’s pixels. To ensure the security of the proposed scheme, chaotic maps have been deployed to reach an acceptable level of security with minimum computational overhead. The proposed scheme is novel in design in terms of the chaotic maps used and it is tested in challenging large gathering scenario. Experimental results demonstrate that the proposed method successfully locates any falsification in the transmitted images, and the performance of the scheme evaluates different types of attacks. Our testing results in good rate tamper of detection with TPR=99.2005, TNR=99.0777 and with a good quality of imperceptibility for the watermarked image with PSNR=43.82dB, SSIM=00.9955.
- Published
- 2023
- Full Text
- View/download PDF
23. A robust document image watermarking scheme using deep neural network.
- Author
-
Ge, Sulong, Xia, Zhihua, Fei, Jianwei, Tong, Yao, Weng, Jian, and Li, Ming
- Abstract
Watermarking is an important copyright protection technology which generally embeds the identity information into the carrier imperceptibly. Then the identity can be extracted to prove the copyright from the watermarked carrier even after suffering various attacks. Most of the existing watermarking technologies take the nature images as carriers. Different from the natural images, document images are not so rich in color and texture, and thus have less redundant information to carry watermarks. This paper proposes an end-to-end document image watermarking scheme using the deep neural network. Specifically, an encoder and a decoder are designed to embed and extract the watermark. A noise layer is added to simulate the various attacks that could be encountered in reality, such as the Cropout, Dropout, Gaussian blur, Gaussian noise, Resize, and JPEG Compression. A text-sensitive loss function is designed to limit the embedding modification on characters. An embedding strength adjustment strategy is proposed to improve the quality of watermarked image with little loss of extraction accuracy. Experimental results show that the proposed document image watermarking technology outperforms three state-of-the-art methods in terms of the robustness and image quality. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. A zero-watermarking for color image based on LWT-SVD and chaotic system.
- Author
-
Chu, Ran, Zhang, Shufang, Mou, Jun, and Gao, Xinyu
- Subjects
SINGULAR value decomposition ,DIGITAL watermarking ,LYAPUNOV exponents ,BIFURCATION diagrams ,WAVELET transforms ,CORRECTION factors ,ROTATIONAL motion - Abstract
A zero-watermarking algorithm for color image based on lifting wavelet transform (LWT), singular value decomposition (SVD) and chaotic system is proposed in this paper. Firstly, the characteristics of a 5-D chaotic system are analyzed by phase diagrams, Lyapunov exponent spectrums and bifurcation diagrams. The initial conditions of the chaotic system are changed by hash value calculated from the watermark image. Then, feature information of low-frequency region of color image is extracted by LWT, and the maximum singular value is obtained by improved SVD. Based on chaos correction factor, the feature matrix can be extracted and encrypted by SVD simultaneously. And the watermark image is composed of meaningful single watermark or combined watermark. Finally, zero-watermarking is generated by encryption and logical operation of feature matrix and watermark image. During authentication, the watermark image can be extracted from the color image and the registered zero-watermarking, and the copyright ownership can be determined according to the registration time. This algorithm can effectively protect image copyright without changing image and has good robustness. Experiments verify the effectiveness of the algorithm and its ability to resist filtering, compression, rotation, noise and clipping attacks, and the NC value of each attack is higher than 89%. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Multimedia Authentication Through Digital Tattooing Scheme at IoT Perception Layer for Smart City.
- Author
-
Halder Jana, Sharmistha, Jana, Biswapati, and Lu, Tzu Chuen
- Subjects
- *
SMART cities , *INTERNET of things , *TATTOOING , *DIGITAL technology , *TELECOMMUNICATION - Abstract
The move to a digital environment, where consumers may utilise, process, store, and transfer their data, has occurred in recent years. Furthermore, the quick and ongoing evolution of the Internet of Things (IoT) has resulted in a massive increase in the utilisation of digital signals and images. The Internet of Things (IoT) is a huge and varied network of connected devices, everyday objects, and gadgets that can communicate with one another over the Internet. The Internet of Things has a lot of potential to become a part of everyday life and improve people's lives. In recent decades, digital tattooing has been offered as a great way to handle numerous elements of IoT security. This technology works by embedding a digital signal called a digital tattoo into another digital signal called a host signal, which can be text, image, audio, or video. The principle of this approach is to detect changed pixels using the Cyclic Redundancy Check (CRC) code. The CRC is a data integrity check that is both powerful and simple to use. It is the most used method of mistake detection in telecommunications. For these reasons, it has been used in the context of the fragile tattoo to determine whether or not the picture has been altered. The experimental results show that the proposed schemes perform well in contrast to the existing scheme and use traditional evaluation criteria, proving that the new scheme is distinctive. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
26. Watermark Based on Singular Value Decomposition.
- Author
-
Mohammed Baqer Qazzaz, Ali Abdulazeez and Kadhim, Neamah Enad
- Subjects
DIGITAL watermarking ,SINGULAR value decomposition ,WATERMARKS - Abstract
Copyright of Baghdad Science Journal is the property of Republic of Iraq Ministry of Higher Education & Scientific Research (MOHESR) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
27. A Comprehensive Approach to Image Protection in Digital Environments.
- Author
-
Villegas-Ch, William, García-Ortiz, Joselin, and Govea, Jaime
- Subjects
DIGITAL technology ,ENVIRONMENTAL protection ,DIGITAL watermarking ,WATERMARKS ,DIGITAL media ,DIGITAL images ,PIXELS - Abstract
Protecting the integrity of images has become a growing concern due to the ease of manipulation and unauthorized dissemination of visual content. This article presents a comprehensive approach to safeguarding images' authenticity and reliability through watermarking techniques. The main goal is to develop effective strategies that preserve the visual quality of images and are resistant to various attacks. The work focuses on developing a watermarking algorithm in Python, implemented with embedding in the spatial domain, transformation in the frequency domain, and pixel modification techniques. A thorough evaluation of efficiency, accuracy, and robustness is performed using numerical metrics and visual assessment to validate the embedded watermarks. The results demonstrate the algorithm's effectiveness in protecting the integrity of the images, although some attacks may cause visible degradation. Likewise, a comparison with related works is made to highlight the relevance and effectiveness of the proposed techniques. It is concluded that watermarks are presented as an additional layer of protection in applications where the authenticity and integrity of the image are essential. In addition, the importance of future research that addresses perspectives for improvement and new applications to strengthen the protection of the goodness of pictures and other digital media is highlighted. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
28. Things In Themselves: The X‐Ray and Its Embodied Space.
- Author
-
Robinson, Paul O
- Subjects
X-rays ,TWENTIETH century ,BONE mechanics - Abstract
At the dawn of the 20th century, the development of the X‐ray and new‐found visions of the interior of bodies inspired artists including Marcel Duchamp. Visual artist and architect Paul O Robinson explores these 'bones and organs' within contemporary contexts, artistically exploiting the shadowy, invisible world of interiority, visible exterior form and the uncanny correspondence between them through transformative spatial and material manifestations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. The Watermark Imaging System: Revealing the Internal Structure of Historical Papers.
- Author
-
Ou, Elisa, Messier, Paul, Lian, Ruixue, Messier, Andrew, and Sethares, William
- Subjects
IMAGING systems ,DIGITAL watermarking ,ART conservators ,ART historians ,LIFE skills education ,GREY relational analysis ,WATERMARKS ,MULTIPLE criteria decision making ,PHOTOGRAPHS - Abstract
This paper introduces the Watermark Imaging System (WImSy) which can be used to photograph, document, and study sheets of paper. The WImSy provides surface images, raking light images, and transmitted light images of the paper, all in perfect alignment. We develop algorithms that exploit this alignment by combining several images together in a process that mimics both the "surface image removal" technique and the method of "high dynamic range" photographs. An improved optimization criterion and an automatic parameter selection procedure streamline the process and make it practical for art historians and conservators to extract the relevant information to study watermarks. The effectiveness of the method is demonstrated in several experiments on images taken with the WImSy at the Metropolitan Museum of Art in New York and at the Getty Museum in Los Angeles, and the results are compared with manually optimized images. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. Reversible Database Watermarking Based on Order-preserving Encryption for Data Sharing.
- Author
-
DONGHUI HU, QING WANG, SONG YAN, XIAOJUN LIU, MENG LI, and SHULI ZHENG
- Abstract
In the era of big data, data sharing not only boosts the economy of the world but also brings about problems of privacy disclosure and copyright infringement. The collected data may contain users' sensitive information; thus, privacy protection should be applied to the data prior to them being shared. Moreover, the shared data may be re-shared to third parties without the consent or awareness of the original data providers. Therefore, there is an urgent need for copyright tracking. There are few works satisfying the requirements of both privacy protection and copyright tracking. The main challenge is how to protect the shared data and realize copyright tracking while not undermining the utility of the data. In this article, we propose a novel solution of a reversible database watermarking scheme based on order-preserving encryption. First, we encrypt the data using order-preserving encryption and adjust an encryption parameter within an appropriate interval to generate a ciphertext with redundant space. Then, we leverage the redundant space to embed robust reversible watermarking. We adopt grouping and K-means to improve the embedding capacity and the robustness of the watermark. Formal theoretical analysis proves that the proposed scheme guarantees correctness and security. Results of extensive experiments show that OPEW has 100% data utility, and the robustness and efficiency of OPEW are better than existing works. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Particle Swarm Optimization-Driven DSE-Based Low-Cost Hardware Security for Securing DSP IP Cores
- Author
-
Rathor, Mahendra, Sengupta, Anirban, Chlamtac, Imrich, Series Editor, Shandilya, Shishir Kumar, editor, Wagner, Neal, editor, Gupta, V.B., editor, and Nagar, Atulya K., editor
- Published
- 2022
- Full Text
- View/download PDF
32. A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO Technique
- Author
-
Rinki, Kumari, Verma, Pushpneel, Singh, Ranjeet Kumar, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, Bhateja, Vikrant, editor, Tang, Jinshan, editor, Satapathy, Suresh Chandra, editor, Peer, Peter, editor, and Das, Ranjita, editor
- Published
- 2022
- Full Text
- View/download PDF
33. IPFS-Based Image Sharing Using Perceptual Hash Code with Digital Right Management
- Author
-
Geethanjali, D., Priya, R., Bhavani, R., Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Singh, Pradeep Kumar, editor, Kolekar, Maheshkumar H., editor, Tanwar, Sudeep, editor, Wierzchoń, Sławomir T., editor, and Bhatnagar, Raj K., editor
- Published
- 2022
- Full Text
- View/download PDF
34. Localized Tamper Detection in Digital Images Using Three Phase Reversible Watermarking
- Author
-
Gupta, Praneesh, Panda, Jeebananda, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zhang, Junjie James, Series Editor, Dhawan, Amit, editor, Tripathi, Vijay Shanker, editor, Arya, Karm Veer, editor, and Naik, Kshirasagar, editor
- Published
- 2022
- Full Text
- View/download PDF
35. Video Copyright Protection.
- Author
-
Laftah, Muna Majeed, Hamid, Iman I., and Ali, Nashwan Alsalam
- Subjects
COPYRIGHT ,DISCRETE wavelet transforms ,DIGITAL video ,DIGITAL watermarking ,WATERMARKS - Abstract
Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the chaotic map (tent map) was used to choose a number of frames which are greater or equal to the number of blocks of the watermark. The host frame selection method makes the discovery of the watermark information by illegal means very complicated. The experimental results show that the proposed method can produce excellent transparency with robustness against some attacks where the average_ PSNR reaches to 72.806. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Comparative Study of Security Features of Drivers' License
- Author
-
Dadwal, Ashish, Semwal, Vaishnavi, and Mishra, Amarnath
- Published
- 2022
- Full Text
- View/download PDF
37. Method for Information Protection of Digital Documents Using Invisible Digital Watermarks and Its Implementation
- Author
-
Kristina Gurtova
- Subjects
document marking ,watermark ,glyph ,invisibility ,leak detection ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Currently, many digital data transmitted over the Internet are often attacked by intruders. This leads to information leakage and creates serious problems in the field of copyright protection, property rights protection, authentication, etc. In recent years, the technology of digital watermarks for application in content protection problems has attracted great attention from users and researchers. A particularly demanding area of digital marking is the marking of documents, which are very sensitive to any changes of text. This article reviews the current trends in watermarking and watermarking technologies on digital documents to identify state-of-the-art techniques and their limitations. Also, a general architecture of the algorithm for applying and extracting reliable and imperceptible watermarks into a document, based on changing text glyphs, is being developed to solve the problem of tracking the source of information leakage. Using this algorithm, we can extract watermark information from document screenshots. Compared to previous algorithms for watermarking documents, the proposed scheme guarantees content-independent embedding, as well as the invisibility of the digital mark. In addition, the proposed marking scheme shows a high extraction accuracy.
- Published
- 2022
- Full Text
- View/download PDF
38. Flink水位线动态调整策略.
- Author
-
吕鹤轩, 黄 山, 艾力卡木, 再比布拉, 吴思衡, and 段晓东
- Abstract
Two of the most important task metrics that measure data-mining performance specific to big data: one is real-time and the other is accuracy. The stream data flows from data generation to message queue and then into Flink through data source for calculation. In this process, due to different network transmission speed and different computing performance of different nodes, the sequence of stream data entering the computing framework and the time sequence of events generated by data will be partially out of order. The traditional watermark mechanism for window-facing operations cannot consider the real-time performance and accuracy of the operation results in the case of streaming data with uncertain out-of-order degree. To solve this problem, a stream data microcluster model is established. Based on the local out-of-order degree of stream data event time, the out-of-order degree of stream data representing the current moment is calculated by the local out-of-order degree algorithm. A dynamic watermark adjustment strategy is designed to adjust the watermark dynamically according to the degree of flow data disorder. Finally, the dynamic watermark adjustment strategy based on event time window is implemented in Apache Flink framework. Experimental results show that the dynamic watermark adjustment strategy based on event time window can effectively consider the accuracy and real-time performance of window operation under the condition of elastic or uncertain chaotic flow data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. A dual watermarking scheme for identity protection.
- Author
-
Sharma, Sunpreet, Zou, Ju Jia, and Fang, Gu
- Subjects
DIGITAL watermarking ,WATERMARKS ,COPYRIGHT ,DIGITAL media ,EVALUATION methodology - Abstract
A novel dual watermarking scheme with potential applications in identity protection, media integrity maintenance and copyright protection in both electronic and printed media is presented. The proposed watermarking scheme uses the owner's signature and fingerprint as watermarks through which the ownership and validity of the media can be proven and kept intact. To begin with, the proposed watermarking scheme is implemented on continuous-tone/greyscale images, and later extended to images achieved via multitoning, an advanced version of halftoning-based printing. The proposed watermark embedding is robust and imperceptible. Experimental simulations and evaluations of the proposed method show excellent results from both objective and subjective view-points. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Analysis of Embedding Locations in the Subband Frequency DCT on Scanned Images.
- Author
-
Hidayati, Indri, Budiman, Mohammad Andri, and Zarlis, Muhammad
- Subjects
DISCRETE cosine transforms ,IDENTIFICATION cards ,COMPUTER access control ,DIGITAL image watermarking ,SIGNAL-to-noise ratio - Abstract
Uploading an identity card as an image for the account verification process or transactions online can be a threat to application users. Identity card theft can be carried out by irresponsible persons if the application can be hacked. Therefore, protection of the image is required for authentication. In this study, the proposed technique is watermarking. A watermark in the form of a binary image will be embedded into the image as ownership using a Discrete Cosine Transform. The Discrete Cosine Transform works in the frequency domain. The location of the embedding of different watermarks was analysed in each 8×8 DCT block. The results of the analysis to assess the imperceptibility of original images and watermarked images using PSNR (Peak Signal to Noise Ratio) and SSIM (Structural Similarity Index Measure), while assessing the watermark robustness embedded using NCC (Normalized Cross Correlation). The results show PSNR (Peak Signal to Noise Ratio) = 54 dB with a watermark strength of 0,1 and an average SSIM (Structural Similarity Index Measure) = 0,9 on 4 scanned images in BMP format with a resolution of 100 DPI. A good watermark embedding is done on the green component at middle frequencies to maintain a balance between imperceptibility and robustness. In contrast, the red component at low frequency is vulnerable to attacks in the form of brightness +20 and contrast +50 with an average NCC (Normalized Cross Correlation) = 0,85. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market.
- Author
-
Wang, Chia-Hui and Hsu, Chih-Hao
- Subjects
- *
BLOCKCHAINS , *INTERNET of things , *BIG data , *PUBLIC sector , *DECISION making - Abstract
According to the ever-growing supply and demand of IoT content, IoT big data in diversified applications are deemed a valuable asset by private and public sectors. Their privacy protection has been a hot research topic. Inspired by previous work on bounded-error-pruned IoT content market, we observe that the anonymity protection with robust watermarking can be developed by further pruning data for better resource-efficient IoT big data without violating the required quality of sensor service or quality of decision-making. In this paper, resource-efficient anonymity protection with watermarking is thus proposed for data consumers and owners of IoT big data market via blockchain. Our proposed scheme can provide the IoT data with privacy protections of both anonymity and ownership in IoT big data market with resource efficiency. The experiments of four different-type IoT datasets with different settings included bounded-errors, sub-stream sizes, watermark lengths, and ratios of data tampering. The performance results demonstrated that our proposed scheme can provide data owners and consumers with ownership and anonymity via watermarking the IoT big data streams for lossless compressibility. Meanwhile, the developed DApp with our proposed scheme on the Ethereum blockchain can help data owners freely share and trade with consumers in convenience with availability, reliability, and security without mutual trust. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment.
- Author
-
Lafta, Ali Lazim and Abdulsada, Ayad I.
- Subjects
- *
CONTENT-based image retrieval , *COPYRIGHT , *IMAGE databases , *CLOUD computing , *WATERMARKS , *DIGITAL watermarking , *DATA privacy - Abstract
Every day, a tremendous amount of image data is generated as a result of recent advances in imaging and computing technology. Several content-based image retrieval (CBIR) approaches have been introduced for searching image collections. These methods, however, involve greater computing and storage resources. Cloud servers can address this issue by offering a large amount of computational power at a low cost. However, cloud servers are not completely trustworthy, and data owners are concerned about the privacy of their personal information. In this research, we propose and implement a secure CBIR (SCBIR) strategy for searching and retrieving cipher text image databases. In the proposed scheme, the extract aggregated feature vectors to represent the related image collection and use a safe Asymmetric Scalar-Product-Preserving Encryption (ASPE) approach to encrypt these vectors while still allowing for similarity computation. To improve search time, all encrypted features are recursively clustered using the k-means method to create a tree index. The results reveal that SCBIR is faster at indexing and retrieving than earlier systems, with superior retrieval precision and scalability. In addition, our paper introduces the watermark to discover any illegal distributions of the images that are received by unlawful data users. Particularly, the cloud server integrates a unique watermark directly into the encrypted images before sending them to the data users. As a result, if an unapproved image copy is revealed, the watermark can be extracted and the unauthorized data users who spread the image can be identified. The performance of the proposed scheme is proved, while its performance is demonstrated through experimental results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
43. A Review on Digital Watermarking-Based Image Forensic Technique
- Author
-
Kumar, Sanjay, Singh, Binod Kumar, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Bajpai, Manish Kumar, editor, Kumar Singh, Koushlendra, editor, and Giakos, George, editor
- Published
- 2021
- Full Text
- View/download PDF
44. Toward Sliding Time Window of Low Watermark to Detect Delayed Stream Arrival
- Author
-
Zhang, Xiaoqian, Ma, Kun, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin (Sherman), Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Gao, Honghao, editor, Wang, Xinheng, editor, Iqbal, Muddesar, editor, Yin, Yuyu, editor, Yin, Jianwei, editor, and Gu, Ning, editor
- Published
- 2021
- Full Text
- View/download PDF
45. Watermarking in Computer Aided Design-Generated 3D Objects
- Author
-
Garg, Hitendra, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Kumar, Rajesh, editor, Dohare, R. K., editor, Dubey, Harishchandra, editor, and Singh, V. P., editor
- Published
- 2021
- Full Text
- View/download PDF
46. Wavelet and LSB-Based Encrypted Watermarking Approach to Hide Patient’s Information in Medical Image
- Author
-
Huma, Faiza, Jahan, Maryeama, Rashid, Ismat Binte, Yousuf, Mohammad Abu, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, and Uddin, Mohammad Shorif, editor
- Published
- 2021
- Full Text
- View/download PDF
47. Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership
- Author
-
Kumar, Naveen, Sharma, Vijay Kumar, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Purohit, Sunil Dutt, editor, Singh Jat, Dharm, editor, Poonia, Ramesh Chandra, editor, Kumar, Sandeep, editor, and Hiranwal, Saroj, editor
- Published
- 2021
- Full Text
- View/download PDF
48. Watermarking 3D Printing Data Based on Coyote Optimization Algorithm
- Author
-
Mouhamed, Mourad R., Soliman, Mona M., Darwish, Ashraf, Hassanien, Aboul Ella, Kacprzyk, Janusz, Series Editor, Hassanien, Aboul Ella, editor, and Darwish, Ashraf, editor
- Published
- 2021
- Full Text
- View/download PDF
49. Digital Watermarking to Protect Deep Learning Model
- Author
-
Gupta, Laveesh, Gupta, Muskan, Meeradevi, Khaitan, Nishit, Mundada, Monica R., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Bhattacharyya, Siddhartha, editor, Nayak, Janmenjoy, editor, Prakash, Kolla Bhanu, editor, Naik, Bighnaraj, editor, and Abraham, Ajith, editor
- Published
- 2021
- Full Text
- View/download PDF
50. Protection of Patients’ Data Privacy by Tamper Detection and Localization in Watermarked Medical Images
- Author
-
ElSaadawy, Alaa H., ELSayed, Ahmed S., Al-Berry, M. N., Roushdy, Mohamed, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Hassanien, Aboul Ella, editor, Slowik, Adam, editor, Snášel, Václav, editor, El-Deeb, Hisham, editor, and Tolba, Fahmy M., editor
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.