Today,
the
internet
allows
users
to
share
images
that
may
have
been
tampered
with.
This
study
proposes
an
improvement
in
tamper
detection
with
semi-fragile
image
watermarking
identify
attacked
images.
The
is
transformed
into
second
level
of
integer
wavelet
transform
(IWT)
generate
a
watermarked
and
detection.
authentication
bits
are
generated
from
bitwise
XOR
approximation
coefficients
(ACb)
sub-band
random
binary
matrix.
Then,
embedded
horizontal
detail
coefficient
(HCb)
vertical
(VCb)
sub-band.
At
detection,
cross-detect
HCb
VCb
used
After
process,
attack
classification
malicious
incidental
attacks
computed
using
Normalized
Hamming
Similarity
(NHS).
If
considered
malicious,
optimized
algorithm
improve
technique
uses
neighbour
calculate
enhance
process.
experimental
results
show
our
proposed
approach
has
improved
accuracy
precision
detected
perfectly
between
through
scheme
achieved
54.73
dB
PSNR
value
SSIM
0.9987
for
For
method
average
0.9714
F1-score
0.9705
various
attacks.
can
achieve
high
97.85%
against
collage
attack,
copy-paste
object
deletion
attack.
Multimedia Tools and Applications,
Journal Year:
2023,
Volume and Issue:
83(11), P. 31829 - 31891
Published: Sept. 19, 2023
Abstract
Identity
protection
is
an
indispensable
feature
of
any
information
security
system.
An
identity
can
exist
in
the
form
digitally
written
signatures,
biometric
information,
logos,
etc.
It
serves
vital
purpose
owners’
verification
and
provides
them
with
a
safety
net
against
their
imposters,
so
its
essential.
Numerous
mechanisms
are
being
developed
to
achieve
this
goal,
embedding
prominent
among
all.
consists
cryptography,
steganography,
watermarking;
collectively,
they
known
as
data
hiding
(DH)
techniques.
In
addition
providing
insight
into
various
DH
techniques,
review
prominently
covers
image
watermarking
works
that
have
positively
influenced
relevant
research
area.
To
end,
one
main
aspects
study
inclusive
nature
reviewing
via
which
it
aims
provide
360
$$^{\circ
}$$
∘
view
technology.
The
contributions
summarised
below.
proposed
more
than
100
major
field
continue
do
so.
This
approach
makes
discussion
effective
allows
us
pivot
on
area
instead
just
highlighting
many
existing
methods
possible.
Moreover,
also
empowers
readers
current
trends,
pros
cons
state-of-the-art
methods,
recommendations
for
future
works.
works,
solves
issue
reverse-engineering
methods.
For
instance,
most
recent
surveys
focused
primarily
possible
without
probing
actual
working
leave
readership
understanding
implementing
or
method.
especially
prevalent
newcomers
field;
hence,
presents
breakdown
well-known
A
new
systematisation
classifying
proposed.
classifies
techniques
two
phases.
first
phase
divides
three
categories
based
domain
employed
during
watermark
embedding.
further
classified
other
attributes
following
phase.
International Journal of Advanced Computer Science and Applications,
Journal Year:
2022,
Volume and Issue:
13(6)
Published: Jan. 1, 2022
Along
with
the
development
of
Covid-19
pandemic,
many
responses
and
news
were
shared
through
social
media.
The
new
vaccination
promoted
by
government
has
raised
pros
cons
from
public.
Public
resistance
to
covid-19
will
lead
a
higher
fatality
rate.
This
study
carried
out
sentiment
analysis
about
vaccine
using
Support
Vector
Machine
(SVM).
research
aims
public
response
acceptance
program.
result
can
be
used
determine
direction
policy.
Data
collection
was
taken
via
Twitter
in
year
2021.
data
then
undergoes
preprocessing
methods.
Afterward,
is
processed
SVM
classification.
Finally,
evaluated
confusion
matrix.
experimental
shows
that
produces
56.80%
positive,
33.75%
neutral,
9.45%
negative.
highest
model
accuracy
obtained
RBF
kernel
92%,
linear
polynomial
kernels
90%
accuracy,
sigmoid
89%
accuracy.
International Journal of Advanced Computer Science and Applications,
Journal Year:
2022,
Volume and Issue:
13(4)
Published: Jan. 1, 2022
Digital
medical
image
has
a
potential
to
be
manipulated
by
unauthorized
persons
due
advanced
communication
technology.
Verifying
integrity
and
authenticity
have
become
important
issues
on
the
image.
This
paper
proposed
self-embedding
watermark
using
spiral
block
mapping
for
tamper
detection
restoration.
The
block-based
coding
with
size
of
3×3
was
applied
perform
two
authentication
bits
seven
recovery
bits.
are
obtained
from
set
condition
between
sub-block
image,
parity
each
sub-block.
embedded
in
least
significant
mapping.
into
different
sub-blocks
based
watermarked
images
were
tested
under
various
tampered
such
as
blurred
unsharp-masking,
copy-move,
mosaic,
noise,
removal,
sharpening.
experimental
results
show
that
scheme
achieved
PSNR
value
about
51.29
dB
SSIM
0.994
showed
localization
accuracy
93.8%.
In
addition,
does
not
require
external
information
able
recover
40.45
0.994.
Journal of Imaging,
Journal Year:
2025,
Volume and Issue:
11(2), P. 58 - 58
Published: Feb. 13, 2025
This
systematic
literature
review
aims
to
understand
new
developments
and
challenges
in
facial
recognition
technology.
will
provide
an
understanding
of
the
system
principles,
performance
metrics,
applications
technology
various
fields
such
as
health,
society,
security
from
academic
publications,
conferences,
industry
news.
A
comprehensive
approach
was
adopted
technologies.
It
emphasizes
most
important
techniques
algorithm
development,
examines
explores
their
fields.
The
mainly
recent
development
deep
learning
techniques,
especially
CNNs,
which
greatly
improved
accuracy
efficiency
systems.
findings
reveal
that
there
has
been
a
noticeable
evolution
technology,
with
current
use
techniques.
Nevertheless,
it
highlights
challenges,
including
privacy
concerns,
ethical
dilemmas,
biases
These
factors
highlight
necessity
using
regulated
manner.
In
conclusion,
paper
proposes
several
future
research
directions
establish
reliability
systems
reduce
while
building
user
confidence.
considerations
are
key
responsibly
advancing
by
ensuring
practices
safeguarding
privacy.
Engineering Science and Technology an International Journal,
Journal Year:
2023,
Volume and Issue:
48, P. 101586 - 101586
Published: Dec. 1, 2023
The
development
of
internet
technology
has
simplified
the
sharing
and
modification
digital
image
information.
aim
this
study
is
to
propose
a
new
blind
recovery
technique
based
on
integer
wavelets
transform
(BRIWT)
by
utilizing
their
content.
LSB
adjustment
wavelet
used
embed
data
into
two
least
significant
bits
(LSB)
Authentication
are
embedded
current
locations
content,
while
information
different
block
proposed
mapping.
securely
placed
at
random
within
LSBs
using
secret
key.
A
three-layer
embedding
authentication
validate
integrity
contents,
achieving
high
precision
accuracy.
Tamper
localization
accuracy
employed
identify
from
This
research
also
investigates
inpainting
method
enhance
tampered
images.
performed
identifying
non-tampered
pixels
in
surrounding
tamper
localization.
results
demonstrate
that
scheme
can
produce
highly
watermarked
images
with
imperceptibility,
an
average
SSIM
value
0.9978
PSNR
46.20
dB.
significantly
improves
localization,
0.9943
0.9971.
transforms
achieves
high-quality
0.9934
under
tampering
rate
10%.
findings
reveal
quality
14.2
%
80
%.