An Improved Tamper Detection with Iwt for Semi-Fragile Image Watermarking DOI
Agit Amrullah, Ferda Ernawan

Published: Jan. 1, 2024

Today, the internet allows users to share images that may have been tampered with. This study proposes an improvement in tamper detection with semi-fragile image watermarking identify attacked images. The is transformed into second level of integer wavelet transform (IWT) generate a watermarked and detection. authentication bits are generated from bitwise XOR approximation coefficients (ACb) sub-band random binary matrix. Then, embedded horizontal detail coefficient (HCb) vertical (VCb) sub-band. At detection, cross-detect HCb VCb used After process, attack classification malicious incidental attacks computed using Normalized Hamming Similarity (NHS). If considered malicious, optimized algorithm improve technique uses neighbour calculate enhance process. experimental results show our proposed approach has improved accuracy precision detected perfectly between through scheme achieved 54.73 dB PSNR value SSIM 0.9987 for For method average 0.9714 F1-score 0.9705 various attacks. can achieve high 97.85% against collage attack, copy-paste object deletion attack.

Language: Английский

A review of image watermarking for identity protection and verification DOI Creative Commons
Sunpreet Sharma, Ju Jia Zou, Gu Fang

et al.

Multimedia Tools and Applications, Journal Year: 2023, Volume and Issue: 83(11), P. 31829 - 31891

Published: Sept. 19, 2023

Abstract Identity protection is an indispensable feature of any information security system. An identity can exist in the form digitally written signatures, biometric information, logos, etc. It serves vital purpose owners’ verification and provides them with a safety net against their imposters, so its essential. Numerous mechanisms are being developed to achieve this goal, embedding prominent among all. consists cryptography, steganography, watermarking; collectively, they known as data hiding (DH) techniques. In addition providing insight into various DH techniques, review prominently covers image watermarking works that have positively influenced relevant research area. To end, one main aspects study inclusive nature reviewing via which it aims provide 360 $$^{\circ }$$ view technology. The contributions summarised below. proposed more than 100 major field continue do so. This approach makes discussion effective allows us pivot on area instead just highlighting many existing methods possible. Moreover, also empowers readers current trends, pros cons state-of-the-art methods, recommendations for future works. works, solves issue reverse-engineering methods. For instance, most recent surveys focused primarily possible without probing actual working leave readership understanding implementing or method. especially prevalent newcomers field; hence, presents breakdown well-known A new systematisation classifying proposed. classifies techniques two phases. first phase divides three categories based domain employed during watermark embedding. further classified other attributes following phase.

Language: Английский

Citations

22

AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation DOI
Afrig Aminuddin, Ferda Ernawan

Computers & Electrical Engineering, Journal Year: 2022, Volume and Issue: 102, P. 108207 - 108207

Published: June 30, 2022

Language: Английский

Citations

24

Sentiment Analysis of Covid-19 Vaccination using Support Vector Machine in Indonesia DOI Open Access
Majid Rahardi, Afrig Aminuddin, Ferian Fauzi Abdulloh

et al.

International Journal of Advanced Computer Science and Applications, Journal Year: 2022, Volume and Issue: 13(6)

Published: Jan. 1, 2022

Along with the development of Covid-19 pandemic, many responses and news were shared through social media. The new vaccination promoted by government has raised pros cons from public. Public resistance to covid-19 will lead a higher fatality rate. This study carried out sentiment analysis about vaccine using Support Vector Machine (SVM). research aims public response acceptance program. result can be used determine direction policy. Data collection was taken via Twitter in year 2021. data then undergoes preprocessing methods. Afterward, is processed SVM classification. Finally, evaluated confusion matrix. experimental shows that produces 56.80% positive, 33.75% neutral, 9.45% negative. highest model accuracy obtained RBF kernel 92%, linear polynomial kernels 90% accuracy, sigmoid 89% accuracy.

Language: Английский

Citations

23

A novel color image tampering detection and self-recovery based on fragile watermarking DOI
Xiaofan Xia, Songsong Zhang,

Kunshu Wang

et al.

Journal of Information Security and Applications, Journal Year: 2023, Volume and Issue: 78, P. 103619 - 103619

Published: Oct. 11, 2023

Language: Английский

Citations

11

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images DOI Open Access
Ferda Ernawan, Afrig Aminuddin,

Danakorn Nincarean

et al.

International Journal of Advanced Computer Science and Applications, Journal Year: 2022, Volume and Issue: 13(4)

Published: Jan. 1, 2022

Digital medical image has a potential to be manipulated by unauthorized persons due advanced communication technology. Verifying integrity and authenticity have become important issues on the image. This paper proposed self-embedding watermark using spiral block mapping for tamper detection restoration. The block-based coding with size of 3×3 was applied perform two authentication bits seven recovery bits. are obtained from set condition between sub-block image, parity each sub-block. embedded in least significant mapping. into different sub-blocks based watermarked images were tested under various tampered such as blurred unsharp-masking, copy-move, mosaic, noise, removal, sharpening. experimental results show that scheme achieved PSNR value about 51.29 dB SSIM 0.994 showed localization accuracy 93.8%. In addition, does not require external information able recover 40.45 0.994.

Language: Английский

Citations

18

Facial Recognition Algorithms: A Systematic Literature Review DOI Creative Commons

N Fadel

Journal of Imaging, Journal Year: 2025, Volume and Issue: 11(2), P. 58 - 58

Published: Feb. 13, 2025

This systematic literature review aims to understand new developments and challenges in facial recognition technology. will provide an understanding of the system principles, performance metrics, applications technology various fields such as health, society, security from academic publications, conferences, industry news. A comprehensive approach was adopted technologies. It emphasizes most important techniques algorithm development, examines explores their fields. The mainly recent development deep learning techniques, especially CNNs, which greatly improved accuracy efficiency systems. findings reveal that there has been a noticeable evolution technology, with current use techniques. Nevertheless, it highlights challenges, including privacy concerns, ethical dilemmas, biases These factors highlight necessity using regulated manner. In conclusion, paper proposes several future research directions establish reliability systems reduce while building user confidence. considerations are key responsibly advancing by ensuring practices safeguarding privacy.

Language: Английский

Citations

0

Face image authentication scheme based on MTCNN and SLT DOI
Rasha Thabit, Mohanad A. Al‐Askari, Dunya Zeki Mohammed

et al.

Multimedia Tools and Applications, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 22, 2025

Language: Английский

Citations

0

Efficient Fragile Watermarking for Image Tampering Detection using Adaptive Matrix on Chaotic Sequencing DOI Creative Commons
Prajanto Wahyu Adi, Aris Sugiharto,

Muhammad Malik Hakim

et al.

Intelligent Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 200530 - 200530

Published: May 1, 2025

Language: Английский

Citations

0

Adaptive coefficient sorting and selection for high capacity data hiding in JPEG images DOI
Jeanne Chen, G.H. Su, Wien Hong

et al.

Signal Image and Video Processing, Journal Year: 2025, Volume and Issue: 19(7)

Published: May 13, 2025

Language: Английский

Citations

0

A blind recovery technique with integer wavelet transforms in image watermarking DOI Creative Commons
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar

et al.

Engineering Science and Technology an International Journal, Journal Year: 2023, Volume and Issue: 48, P. 101586 - 101586

Published: Dec. 1, 2023

The development of internet technology has simplified the sharing and modification digital image information. aim this study is to propose a new blind recovery technique based on integer wavelets transform (BRIWT) by utilizing their content. LSB adjustment wavelet used embed data into two least significant bits (LSB) Authentication are embedded current locations content, while information different block proposed mapping. securely placed at random within LSBs using secret key. A three-layer embedding authentication validate integrity contents, achieving high precision accuracy. Tamper localization accuracy employed identify from This research also investigates inpainting method enhance tampered images. performed identifying non-tampered pixels in surrounding tamper localization. results demonstrate that scheme can produce highly watermarked images with imperceptibility, an average SSIM value 0.9978 PSNR 46.20 dB. significantly improves localization, 0.9943 0.9971. transforms achieves high-quality 0.9934 under tampering rate 10%. findings reveal quality 14.2 % 80 %.

Language: Английский

Citations

7