An Efficient Mathematical Method for Recovery of Tampered Image Content DOI
Tong Liu, Xiaochen Yuan, Chan–Tong Lam

et al.

2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN), Journal Year: 2023, Volume and Issue: unknown, P. 782 - 786

Published: Aug. 17, 2023

To protect the integrity and reliability of images, we propose a watermarking-based approach for identifying whether image has been tampered with during transmission recovering content to its original form. The pixel values are treated as unknowns in our proposed method calculated by solving system equations using Gauss-Jordan elimination. recovery data is obtained encoding MSB matrix secret key then embedded part watermark self-recovery. remainder authentication information localizing forged region, which produced each block. Compared existing works, experimental results show superior capability.

Language: Английский

An Efficient Semi-blind Watermarking Technique Based on ACM and DWT for Mitigating Integrity Attacks DOI
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia

et al.

Arabian Journal for Science and Engineering, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 5, 2025

Language: Английский

Citations

2

Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images DOI
Riadh Bouarroudj,

Feryel Souami,

Fatma Zohra Bellala

et al.

Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 123, P. 110072 - 110072

Published: Jan. 29, 2025

Language: Английский

Citations

1

Software-Defined Networking (SDN): A Review DOI

Quadri Waseem,

Wan Isni Sofiah Wan Din, Afrig Aminuddin

et al.

2022 5th International Conference on Information and Communications Technology (ICOIACT), Journal Year: 2022, Volume and Issue: unknown, P. 30 - 35

Published: Aug. 24, 2022

The Internet of Everything (IoE) connects millions machines, vehicles, nodes, smoke detectors, watches, glasses, webcams, and other devices to the internet. These entities need proper guidance control for expected performance. There is always a manage their networks better performance properly. However, managing all these not easy; it big concern. All types network architectures are getting enhanced daily, traditional management process becomes more complex, especially rendering during technology entity modifications. Software-Defined Networking (SDN) extensively used in networks, future technologies (IoT, IoV, 6G, AI, etc.) tackle such concerns issues. as with any new phrase or paradigm, no clear description this has emerged yet, which will give complete understanding SDN, from basic terminology its capabilities. contribution research article significant step forward basics SDN. This proposes detailed review SDN form history, overview, architecture, benefits, services, trends, application, features, challenges.

Language: Английский

Citations

20

RFDB: Robust watermarking scheme with Fuzzy-DnCNN using blockchain technique for identity verification DOI
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava

et al.

Expert Systems with Applications, Journal Year: 2024, Volume and Issue: 255, P. 124554 - 124554

Published: June 25, 2024

Language: Английский

Citations

4

Exploring information hiding in images – problems and measures: a survey DOI
Ahmed Majeed Khan, Aaliya Sarfaraz

Multimedia Tools and Applications, Journal Year: 2025, Volume and Issue: unknown

Published: April 24, 2025

Language: Английский

Citations

0

Efficient Fragile Watermarking for Image Tampering Detection using Adaptive Matrix on Chaotic Sequencing DOI Creative Commons
Prajanto Wahyu Adi, Aris Sugiharto,

Muhammad Malik Hakim

et al.

Intelligent Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 200530 - 200530

Published: May 1, 2025

Language: Английский

Citations

0

Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method DOI
Ayhan Renklier, Serkan Öztürk

Multimedia Tools and Applications, Journal Year: 2023, Volume and Issue: 83(5), P. 13929 - 13951

Published: July 11, 2023

Language: Английский

Citations

7

A blind recovery technique with integer wavelet transforms in image watermarking DOI Creative Commons
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar

et al.

Engineering Science and Technology an International Journal, Journal Year: 2023, Volume and Issue: 48, P. 101586 - 101586

Published: Dec. 1, 2023

The development of internet technology has simplified the sharing and modification digital image information. aim this study is to propose a new blind recovery technique based on integer wavelets transform (BRIWT) by utilizing their content. LSB adjustment wavelet used embed data into two least significant bits (LSB) Authentication are embedded current locations content, while information different block proposed mapping. securely placed at random within LSBs using secret key. A three-layer embedding authentication validate integrity contents, achieving high precision accuracy. Tamper localization accuracy employed identify from This research also investigates inpainting method enhance tampered images. performed identifying non-tampered pixels in surrounding tamper localization. results demonstrate that scheme can produce highly watermarked images with imperceptibility, an average SSIM value 0.9978 PSNR 46.20 dB. significantly improves localization, 0.9943 0.9971. transforms achieves high-quality 0.9934 under tampering rate 10%. findings reveal quality 14.2 % 80 %.

Language: Английский

Citations

7

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection DOI Creative Commons

Junyu Lin,

Libo Feng, Jinli Wang

et al.

IET Communications, Journal Year: 2024, Volume and Issue: 18(4), P. 309 - 321

Published: March 1, 2024

Abstract In the era of 5G, billions terminal devices achieve global interconnection and intercommunication, which leads to generation massive data. However, existing cloud‐based data‐sharing mechanism faces challenges such as sensitive information leakage data islands, makes it difficult secure sharing across domains. this paper, authors propose a fine‐grained scheme based on blockchain ciphertext policy attribute‐based encryption, design verifiable outsourced computation method reduce computational pressure end users. Second, comprehensively consider user's identity privacy transaction privacy, multi‐level protection ring signature garbled bloom filter, enhance availability, prevent traceability requests. Finally, set interconnected smart contracts, verify that their can efficient through security analysis performance testing.

Language: Английский

Citations

2

Trade-off independent image watermarking using enhanced structured matrix decomposition DOI Creative Commons
Ahmed Khan, KokSheik Wong, Vishnu Monn Baskaran

et al.

Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown

Published: April 18, 2024

Abstract Image watermarking plays a vital role in providing protection from copyright violation. However, conventional techniques typically exhibit trade-offs terms of image quality, robustness and capacity constrains. More often than not, these optimize on one constrain while settling with the two other constraints. Therefore, this paper, an enhanced saliency detection based method is proposed to simultaneously improve capacity, robustness. First, structured matrix decomposition (E-SMD) extract salient regions host for producing mask. This mask then applied partition foreground background watermark images. Subsequently, (with same dimension image) shuffled using multiple Arnold Logistic chaotic maps, resulting shuffled-watermark embedded into wavelet domain image. Furthermore, filtering operation put forward estimate original so that can also operate blind mode. In best case scenario, we could embed 24-bit as another maintaining average SSIM 0.9999 achieving high against commonly attacks. per our knowledge, payload embedding, significant improvement features (in saliency, PSNR, SSIM, NC) has not been achieved by state-of-the-art methods. Thus, outcomes research realizes trade-off independent method, which first its kind domain.

Language: Английский

Citations

2