Современные наукоемкие технологии (Modern High Technologies), Journal Year: 2022, Volume and Issue: 2(№12 2022), P. 211 - 216
Published: Jan. 1, 2022
технический университет», Волгоград, e-mail:
Language: Английский
Современные наукоемкие технологии (Modern High Technologies), Journal Year: 2022, Volume and Issue: 2(№12 2022), P. 211 - 216
Published: Jan. 1, 2022
технический университет», Волгоград, e-mail:
Language: Английский
Measurement Sensors, Journal Year: 2022, Volume and Issue: 24, P. 100521 - 100521
Published: Oct. 22, 2022
End users are now encircled by an ever-increasing volume of information from edge devices relevant to a range stakeholders, thanks the introduction computing in variety application domains. However, because their distrust, these unable communicate significant amounts data. The non-repudiation and non-tampering features block chain used this study provide trust collaborative edges. To address limited processing capabilities devices, create chain-based huge data sharing architecture cooperative Then, for high computational reduction, propose Proof-of-Collaboration consensus technique, which participate formation giving PoC credits. Furthermore, useless transaction filter technique was proposed offloading, drastically decreasing chain's storage space Comprehensive tests carried out illustrate our proposal's better performance. Using learning opportunity environment friendly sustainable infrastructure be created developing countries.
Language: Английский
Citations
25Circuits Systems and Signal Processing, Journal Year: 2023, Volume and Issue: 42(7), P. 4019 - 4050
Published: Feb. 6, 2023
Language: Английский
Citations
16Electronics, Journal Year: 2024, Volume and Issue: 13(2), P. 435 - 435
Published: Jan. 20, 2024
In recent years, there has been a substantial surge in the application of image watermarking, which evolved into an essential tool for identifying multimedia material, ensuring security, and protecting copyright. Singular value decomposition (SVD) discrete cosine transform (DCT) are widely utilized digital watermarking despite considerable computational burden they involve. By combining block-based direct current (DC) values with matrix norm, this research article presents novel, robust zero-watermarking approach. It generates zero-watermark without attempting to modify contents image. The is partitioned non-overlapping blocks, DC computed applying DCT. This sub-image further maximum singular each block calculated by norm instead SVD obtain binary feature matrix. A piecewise linear chaotic map encryption technique improve security watermark After that, created via XOR procedure between encrypted proposed scheme tested using variety distortion attacks including noise, filter, geometric, compression attacks. also compared other relevant methods outperformed them most cases.
Language: Английский
Citations
5SN Computer Science, Journal Year: 2025, Volume and Issue: 6(5)
Published: April 24, 2025
Language: Английский
Citations
0Intelligent Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 200530 - 200530
Published: May 1, 2025
Language: Английский
Citations
0Applied Sciences, Journal Year: 2023, Volume and Issue: 13(14), P. 8430 - 8430
Published: July 21, 2023
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of image’s quality utmost importance, medical images, where improper embedding watermark could change patient’s diagnosis. On other hand, distributed over Internet, owner must also be protected. In this work, an imperceptible, robust, secure, and hybrid presented It based on Hermite Transform (HT) Discrete Cosine (DCT) as spatial–frequency representation grayscale image. Besides, it uses block-based strategy perfectibility analysis best regions inspired by Human Vision System (HVS), giving imperceptibility watermark, Singular-Value Decomposition (SVD) approach improved robustness against attacks. addition, proposed method can two watermarks, binary (LOGO) information about technical data original text format (MetaData). To secure both Jigsaw (JST) Elementary Cellular Automaton (ECA) encrypt LOGO random sequence generator XOR operation MetaData. was tested using public dataset 49 assess effectiveness extraction procedures. Furthermore, evaluated under several processing geometric demonstrate its majority, intentional or unintentional, attacks, comparison made with state-of-the-art techniques. The obtained average values PSNR = 40.2051 dB, NCC 0.9987, SSIM 0.9999, MSSIM 0.9994 watermarked case LOGO, proposal gave MSE 0, ≫ 60 1, whereas, MetaData extracted, BER 0% Berror=0. Finally, encryption large key space (K=1.2689×1089)
Language: Английский
Citations
9Complexity, Journal Year: 2024, Volume and Issue: 2024, P. 1 - 18
Published: May 15, 2024
The existing watermarking algorithms make it difficult to balance the invisibility and robustness of watermark. This paper proposes a robust image method based on discrete wavelet transform (DWT), singular value decomposition (SVD), chaotic maps. is semiblind method. First, logistic-tent map introduced, employing an extensive parameter domain. amalgamated with Arnold’s transformation encrypt watermark image, thereby bolstering security information. Subsequently, frequency domain obtained by applying DWT carrier image. Embedding watermarks in ensures watermark, preference for high-frequency subband after enhanced robustness. SVD then applied both encrypted final step involves embedding values into image’s values, completing information process. In simulation experiments, test was conducted various images, yielding peak signal-to-noise ratio (PSNR) consistently exceeding 43, structural similarity (SSIM) close 1. Robustness testing against types attacks resulted normalized correlation (NC) surpassing 0.9, bit error rate (BER) approaching 0. conclusion, proposed algorithm satisfies imperceptibility requirements while demonstrating formidable
Language: Английский
Citations
2Applied Sciences, Journal Year: 2023, Volume and Issue: 13(10), P. 6105 - 6105
Published: May 16, 2023
In recent years, digital image watermarking has gained a significant amount of popularity and developed into crucial essential tool for copyright protection, security, the identification multimedia content. Despite its high computational complexity, singular value decomposition (SVD) is an extensively utilized transformation in watermarking. This research presents robust blind scheme that directly alters pixels spatial domain to incorporate watermark by quantizing block-wise invariant maximum value. Using distribution rule, from cover are redistributed obtain new divided square non-overlapping blocks values using matrix 2-norm without performing SVD transform. modifies such outcome equivalent difference between corresponding covers watermarked images. The strengths proposed approach highlighted comparison experimental results with most comparable approaches.
Language: Английский
Citations
5Measurement Sensors, Journal Year: 2023, Volume and Issue: 29, P. 100850 - 100850
Published: June 26, 2023
The widespread availability of the internet, in conjunction with very low-cost digital recording and storage devices, has ushered an age which reproduction, illegal use, malicious dissemination information have become much more straightforward. Authentication multimedia materials garnered a lot interest recent days as means preventing usage, theft, misrepresentation content. Invisible watermarking tries to hide medium order demonstrate ownership, integrity, or secret message. goal invisible is watermark extract it without making evident that cover image watermarked. This paper presents technique can large color water marks media. proposed model uses Conditional Variational Autoencoder (CVAE) encode into image. watermarked then decoded at receiver watermark. Unlike conventional techniques simple, small black white watermark, embed full images watermarks images. makes superior existing models by hiding stego produced high PSNR greater than 40 for different are visually indistinct from original
Language: Английский
Citations
3Applied Sciences, Journal Year: 2023, Volume and Issue: 13(24), P. 13088 - 13088
Published: Dec. 7, 2023
To clarify the copyrights of 3D models oblique photography (3DMOP) and guarantee their security, a novel security protection scheme 3DMOP was proposed in this study by synergistically applying digital watermarking data encryption. In scheme, point clouds were clustered first, then centroid feature points each cluster calculated extracted, respectively. Afterward, watermarks embedded into cluster-by-cluster, taking distances between centroids as embedding positions. addition, also using texture coordinates to further enhance robustness algorithm. Furthermore, Arnold transformation performed on images for classified or sensitive information. Experimental results have verified strong imperceptibility algorithm, well high designed encryption The outcomes work can refine current methods thus expand application scope.
Language: Английский
Citations
3