2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN),
Journal Year:
2023,
Volume and Issue:
unknown, P. 782 - 786
Published: Aug. 17, 2023
To
protect
the
integrity
and
reliability
of
images,
we
propose
a
watermarking-based
approach
for
identifying
whether
image
has
been
tampered
with
during
transmission
recovering
content
to
its
original
form.
The
pixel
values
are
treated
as
unknowns
in
our
proposed
method
calculated
by
solving
system
equations
using
Gauss-Jordan
elimination.
recovery
data
is
obtained
encoding
MSB
matrix
secret
key
then
embedded
part
watermark
self-recovery.
remainder
authentication
information
localizing
forged
region,
which
produced
each
block.
Compared
existing
works,
experimental
results
show
superior
capability.
2022 5th International Conference on Information and Communications Technology (ICOIACT),
Journal Year:
2022,
Volume and Issue:
unknown, P. 30 - 35
Published: Aug. 24, 2022
The
Internet
of
Everything
(IoE)
connects
millions
machines,
vehicles,
nodes,
smoke
detectors,
watches,
glasses,
webcams,
and
other
devices
to
the
internet.
These
entities
need
proper
guidance
control
for
expected
performance.
There
is
always
a
manage
their
networks
better
performance
properly.
However,
managing
all
these
not
easy;
it
big
concern.
All
types
network
architectures
are
getting
enhanced
daily,
traditional
management
process
becomes
more
complex,
especially
rendering
during
technology
entity
modifications.
Software-Defined
Networking
(SDN)
extensively
used
in
networks,
future
technologies
(IoT,
IoV,
6G,
AI,
etc.)
tackle
such
concerns
issues.
as
with
any
new
phrase
or
paradigm,
no
clear
description
this
has
emerged
yet,
which
will
give
complete
understanding
SDN,
from
basic
terminology
its
capabilities.
contribution
research
article
significant
step
forward
basics
SDN.
This
proposes
detailed
review
SDN
form
history,
overview,
architecture,
benefits,
services,
trends,
application,
features,
challenges.
Engineering Science and Technology an International Journal,
Journal Year:
2023,
Volume and Issue:
48, P. 101586 - 101586
Published: Dec. 1, 2023
The
development
of
internet
technology
has
simplified
the
sharing
and
modification
digital
image
information.
aim
this
study
is
to
propose
a
new
blind
recovery
technique
based
on
integer
wavelets
transform
(BRIWT)
by
utilizing
their
content.
LSB
adjustment
wavelet
used
embed
data
into
two
least
significant
bits
(LSB)
Authentication
are
embedded
current
locations
content,
while
information
different
block
proposed
mapping.
securely
placed
at
random
within
LSBs
using
secret
key.
A
three-layer
embedding
authentication
validate
integrity
contents,
achieving
high
precision
accuracy.
Tamper
localization
accuracy
employed
identify
from
This
research
also
investigates
inpainting
method
enhance
tampered
images.
performed
identifying
non-tampered
pixels
in
surrounding
tamper
localization.
results
demonstrate
that
scheme
can
produce
highly
watermarked
images
with
imperceptibility,
an
average
SSIM
value
0.9978
PSNR
46.20
dB.
significantly
improves
localization,
0.9943
0.9971.
transforms
achieves
high-quality
0.9934
under
tampering
rate
10%.
findings
reveal
quality
14.2
%
80
%.
IET Communications,
Journal Year:
2024,
Volume and Issue:
18(4), P. 309 - 321
Published: March 1, 2024
Abstract
In
the
era
of
5G,
billions
terminal
devices
achieve
global
interconnection
and
intercommunication,
which
leads
to
generation
massive
data.
However,
existing
cloud‐based
data‐sharing
mechanism
faces
challenges
such
as
sensitive
information
leakage
data
islands,
makes
it
difficult
secure
sharing
across
domains.
this
paper,
authors
propose
a
fine‐grained
scheme
based
on
blockchain
ciphertext
policy
attribute‐based
encryption,
design
verifiable
outsourced
computation
method
reduce
computational
pressure
end
users.
Second,
comprehensively
consider
user's
identity
privacy
transaction
privacy,
multi‐level
protection
ring
signature
garbled
bloom
filter,
enhance
availability,
prevent
traceability
requests.
Finally,
set
interconnected
smart
contracts,
verify
that
their
can
efficient
through
security
analysis
performance
testing.
Multimedia Tools and Applications,
Journal Year:
2024,
Volume and Issue:
unknown
Published: April 18, 2024
Abstract
Image
watermarking
plays
a
vital
role
in
providing
protection
from
copyright
violation.
However,
conventional
techniques
typically
exhibit
trade-offs
terms
of
image
quality,
robustness
and
capacity
constrains.
More
often
than
not,
these
optimize
on
one
constrain
while
settling
with
the
two
other
constraints.
Therefore,
this
paper,
an
enhanced
saliency
detection
based
method
is
proposed
to
simultaneously
improve
capacity,
robustness.
First,
structured
matrix
decomposition
(E-SMD)
extract
salient
regions
host
for
producing
mask.
This
mask
then
applied
partition
foreground
background
watermark
images.
Subsequently,
(with
same
dimension
image)
shuffled
using
multiple
Arnold
Logistic
chaotic
maps,
resulting
shuffled-watermark
embedded
into
wavelet
domain
image.
Furthermore,
filtering
operation
put
forward
estimate
original
so
that
can
also
operate
blind
mode.
In
best
case
scenario,
we
could
embed
24-bit
as
another
maintaining
average
SSIM
0.9999
achieving
high
against
commonly
attacks.
per
our
knowledge,
payload
embedding,
significant
improvement
features
(in
saliency,
PSNR,
SSIM,
NC)
has
not
been
achieved
by
state-of-the-art
methods.
Thus,
outcomes
research
realizes
trade-off
independent
method,
which
first
its
kind
domain.