SECURING OF IMAGES FROM UNAUTHORIZED USE BASED ON EMBEDDING IN THE SPATIAL DOMAIN DOI Open Access
А.Н. Земцов,

K.Z. Chan

Современные наукоемкие технологии (Modern High Technologies), Journal Year: 2022, Volume and Issue: 2(№12 2022), P. 211 - 216

Published: Jan. 1, 2022

технический университет», Волгоград, e-mail:

Language: Английский

Blockchain technology: Applied to big data in collaborative edges DOI Creative Commons
Kamal Saluja, Sunil Gupta, Amit Vajpayee

et al.

Measurement Sensors, Journal Year: 2022, Volume and Issue: 24, P. 100521 - 100521

Published: Oct. 22, 2022

End users are now encircled by an ever-increasing volume of information from edge devices relevant to a range stakeholders, thanks the introduction computing in variety application domains. However, because their distrust, these unable communicate significant amounts data. The non-repudiation and non-tampering features block chain used this study provide trust collaborative edges. To address limited processing capabilities devices, create chain-based huge data sharing architecture cooperative Then, for high computational reduction, propose Proof-of-Collaboration consensus technique, which participate formation giving PoC credits. Furthermore, useless transaction filter technique was proposed offloading, drastically decreasing chain's storage space Comprehensive tests carried out illustrate our proposal's better performance. Using learning opportunity environment friendly sustainable infrastructure be created developing countries.

Language: Английский

Citations

25

An Optimized Deep Fusion Convolutional Neural Network-Based Digital Color Image Watermarking Scheme for Copyright Protection DOI
Manish Rai, Sachin Goyal,

Mahesh Pawar

et al.

Circuits Systems and Signal Processing, Journal Year: 2023, Volume and Issue: 42(7), P. 4019 - 4050

Published: Feb. 6, 2023

Language: Английский

Citations

16

A Robust Zero-Watermarking Scheme in Spatial Domain by Achieving Features Similar to Frequency Domain DOI Open Access
Musrrat Ali, Sanoj Kumar

Electronics, Journal Year: 2024, Volume and Issue: 13(2), P. 435 - 435

Published: Jan. 20, 2024

In recent years, there has been a substantial surge in the application of image watermarking, which evolved into an essential tool for identifying multimedia material, ensuring security, and protecting copyright. Singular value decomposition (SVD) discrete cosine transform (DCT) are widely utilized digital watermarking despite considerable computational burden they involve. By combining block-based direct current (DC) values with matrix norm, this research article presents novel, robust zero-watermarking approach. It generates zero-watermark without attempting to modify contents image. The is partitioned non-overlapping blocks, DC computed applying DCT. This sub-image further maximum singular each block calculated by norm instead SVD obtain binary feature matrix. A piecewise linear chaotic map encryption technique improve security watermark After that, created via XOR procedure between encrypted proposed scheme tested using variety distortion attacks including noise, filter, geometric, compression attacks. also compared other relevant methods outperformed them most cases.

Language: Английский

Citations

5

Fuzzifier Point Estimation Using the Genetic Algorithm to Improve Image Watermarking DOI

Fatemeh Nassaj,

Mohammad Amin,

Ehsan Amiri

et al.

SN Computer Science, Journal Year: 2025, Volume and Issue: 6(5)

Published: April 24, 2025

Language: Английский

Citations

0

Efficient Fragile Watermarking for Image Tampering Detection using Adaptive Matrix on Chaotic Sequencing DOI Creative Commons
Prajanto Wahyu Adi, Aris Sugiharto,

Muhammad Malik Hakim

et al.

Intelligent Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 200530 - 200530

Published: May 1, 2025

Language: Английский

Citations

0

A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT DOI Creative Commons
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva

et al.

Applied Sciences, Journal Year: 2023, Volume and Issue: 13(14), P. 8430 - 8430

Published: July 21, 2023

Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of image’s quality utmost importance, medical images, where improper embedding watermark could change patient’s diagnosis. On other hand, distributed over Internet, owner must also be protected. In this work, an imperceptible, robust, secure, and hybrid presented It based on Hermite Transform (HT) Discrete Cosine (DCT) as spatial–frequency representation grayscale image. Besides, it uses block-based strategy perfectibility analysis best regions inspired by Human Vision System (HVS), giving imperceptibility watermark, Singular-Value Decomposition (SVD) approach improved robustness against attacks. addition, proposed method can two watermarks, binary (LOGO) information about technical data original text format (MetaData). To secure both Jigsaw (JST) Elementary Cellular Automaton (ECA) encrypt LOGO random sequence generator XOR operation MetaData. was tested using public dataset 49 assess effectiveness extraction procedures. Furthermore, evaluated under several processing geometric demonstrate its majority, intentional or unintentional, attacks, comparison made with state-of-the-art techniques. The obtained average values PSNR = 40.2051 dB, NCC 0.9987, SSIM 0.9999, MSSIM 0.9994 watermarked case LOGO, proposal gave MSE 0, ≫ 60 1, whereas, MetaData extracted, BER 0% Berror=0. Finally, encryption large key space (K=1.2689×1089)

Language: Английский

Citations

9

Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map DOI Creative Commons

Weishuai Wu,

Yujiao Dong, Guangyi Wang

et al.

Complexity, Journal Year: 2024, Volume and Issue: 2024, P. 1 - 18

Published: May 15, 2024

The existing watermarking algorithms make it difficult to balance the invisibility and robustness of watermark. This paper proposes a robust image method based on discrete wavelet transform (DWT), singular value decomposition (SVD), chaotic maps. is semiblind method. First, logistic-tent map introduced, employing an extensive parameter domain. amalgamated with Arnold’s transformation encrypt watermark image, thereby bolstering security information. Subsequently, frequency domain obtained by applying DWT carrier image. Embedding watermarks in ensures watermark, preference for high-frequency subband after enhanced robustness. SVD then applied both encrypted final step involves embedding values into image’s values, completing information process. In simulation experiments, test was conducted various images, yielding peak signal-to-noise ratio (PSNR) consistently exceeding 43, structural similarity (SSIM) close 1. Robustness testing against types attacks resulted normalized correlation (NC) surpassing 0.9, bit error rate (BER) approaching 0. conclusion, proposed algorithm satisfies imperceptibility requirements while demonstrating formidable

Language: Английский

Citations

2

Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform DOI Creative Commons
Musrrat Ali

Applied Sciences, Journal Year: 2023, Volume and Issue: 13(10), P. 6105 - 6105

Published: May 16, 2023

In recent years, digital image watermarking has gained a significant amount of popularity and developed into crucial essential tool for copyright protection, security, the identification multimedia content. Despite its high computational complexity, singular value decomposition (SVD) is an extensively utilized transformation in watermarking. This research presents robust blind scheme that directly alters pixels spatial domain to incorporate watermark by quantizing block-wise invariant maximum value. Using distribution rule, from cover are redistributed obtain new divided square non-overlapping blocks values using matrix 2-norm without performing SVD transform. modifies such outcome equivalent difference between corresponding covers watermarked images. The strengths proposed approach highlighted comparison experimental results with most comparable approaches.

Language: Английский

Citations

5

Efficient large invisible color watermark embedding using conditional deep autoencoder model for medical applications DOI Creative Commons

Konka Kishan,

B. Vijay Kumar

Measurement Sensors, Journal Year: 2023, Volume and Issue: 29, P. 100850 - 100850

Published: June 26, 2023

The widespread availability of the internet, in conjunction with very low-cost digital recording and storage devices, has ushered an age which reproduction, illegal use, malicious dissemination information have become much more straightforward. Authentication multimedia materials garnered a lot interest recent days as means preventing usage, theft, misrepresentation content. Invisible watermarking tries to hide medium order demonstrate ownership, integrity, or secret message. goal invisible is watermark extract it without making evident that cover image watermarked. This paper presents technique can large color water marks media. proposed model uses Conditional Variational Autoencoder (CVAE) encode into image. watermarked then decoded at receiver watermark. Unlike conventional techniques simple, small black white watermark, embed full images watermarks images. makes superior existing models by hiding stego produced high PSNR greater than 40 for different are visually indistinct from original

Language: Английский

Citations

3

Security Protection of 3D Models of Oblique Photography by Digital Watermarking and Data Encryption DOI Creative Commons
Yaqin Jiao, Cong Ma, Juhua Luo

et al.

Applied Sciences, Journal Year: 2023, Volume and Issue: 13(24), P. 13088 - 13088

Published: Dec. 7, 2023

To clarify the copyrights of 3D models oblique photography (3DMOP) and guarantee their security, a novel security protection scheme 3DMOP was proposed in this study by synergistically applying digital watermarking data encryption. In scheme, point clouds were clustered first, then centroid feature points each cluster calculated extracted, respectively. Afterward, watermarks embedded into cluster-by-cluster, taking distances between centroids as embedding positions. addition, also using texture coordinates to further enhance robustness algorithm. Furthermore, Arnold transformation performed on images for classified or sensitive information. Experimental results have verified strong imperceptibility algorithm, well high designed encryption The outcomes work can refine current methods thus expand application scope.

Language: Английский

Citations

3