An Efficient Mathematical Method for Recovery of Tampered Image Content DOI
Tong Liu, Xiaochen Yuan, Chan–Tong Lam

и другие.

2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN), Год журнала: 2023, Номер unknown, С. 782 - 786

Опубликована: Авг. 17, 2023

To protect the integrity and reliability of images, we propose a watermarking-based approach for identifying whether image has been tampered with during transmission recovering content to its original form. The pixel values are treated as unknowns in our proposed method calculated by solving system equations using Gauss-Jordan elimination. recovery data is obtained encoding MSB matrix secret key then embedded part watermark self-recovery. remainder authentication information localizing forged region, which produced each block. Compared existing works, experimental results show superior capability.

Язык: Английский

An Efficient Semi-blind Watermarking Technique Based on ACM and DWT for Mitigating Integrity Attacks DOI
Brahim Ferik, Lakhdar Laimeche, Abdallah Meraoumia

и другие.

Arabian Journal for Science and Engineering, Год журнала: 2025, Номер unknown

Опубликована: Фев. 5, 2025

Язык: Английский

Процитировано

2

Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images DOI
Riadh Bouarroudj,

Feryel Souami,

Fatma Zohra Bellala

и другие.

Computers & Electrical Engineering, Год журнала: 2025, Номер 123, С. 110072 - 110072

Опубликована: Янв. 29, 2025

Язык: Английский

Процитировано

1

Software-Defined Networking (SDN): A Review DOI

Quadri Waseem,

Wan Isni Sofiah Wan Din, Afrig Aminuddin

и другие.

2022 5th International Conference on Information and Communications Technology (ICOIACT), Год журнала: 2022, Номер unknown, С. 30 - 35

Опубликована: Авг. 24, 2022

The Internet of Everything (IoE) connects millions machines, vehicles, nodes, smoke detectors, watches, glasses, webcams, and other devices to the internet. These entities need proper guidance control for expected performance. There is always a manage their networks better performance properly. However, managing all these not easy; it big concern. All types network architectures are getting enhanced daily, traditional management process becomes more complex, especially rendering during technology entity modifications. Software-Defined Networking (SDN) extensively used in networks, future technologies (IoT, IoV, 6G, AI, etc.) tackle such concerns issues. as with any new phrase or paradigm, no clear description this has emerged yet, which will give complete understanding SDN, from basic terminology its capabilities. contribution research article significant step forward basics SDN. This proposes detailed review SDN form history, overview, architecture, benefits, services, trends, application, features, challenges.

Язык: Английский

Процитировано

20

RFDB: Robust watermarking scheme with Fuzzy-DnCNN using blockchain technique for identity verification DOI
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava

и другие.

Expert Systems with Applications, Год журнала: 2024, Номер 255, С. 124554 - 124554

Опубликована: Июнь 25, 2024

Язык: Английский

Процитировано

4

Exploring information hiding in images – problems and measures: a survey DOI
Ahmed Majeed Khan, Aaliya Sarfaraz

Multimedia Tools and Applications, Год журнала: 2025, Номер unknown

Опубликована: Апрель 24, 2025

Язык: Английский

Процитировано

0

Efficient Fragile Watermarking for Image Tampering Detection using Adaptive Matrix on Chaotic Sequencing DOI Creative Commons
Prajanto Wahyu Adi, Aris Sugiharto,

Muhammad Malik Hakim

и другие.

Intelligent Systems with Applications, Год журнала: 2025, Номер unknown, С. 200530 - 200530

Опубликована: Май 1, 2025

Язык: Английский

Процитировано

0

Observation of Imbalance Tracer Study Data for Graduates Employability Prediction in Indonesia DOI Open Access
Ferian Fauzi Abdulloh, Majid Rahardi, Afrig Aminuddin

и другие.

International Journal of Advanced Computer Science and Applications, Год журнала: 2022, Номер 13(8)

Опубликована: Янв. 1, 2022

Tracer Study is a mandatory aspect of accreditation assessment in Indonesia. The Indonesian Ministry Education requires all Indonesia Universities to anually report graduate tracer study reports the government. also needed by University evaluating success learning that has been applied curriculum. One things need be evaluated level absorption graduates into working industry, so machine model assist Officials and understanding character its graduates, it can help determine curriculum policies. In this research, researcher focuses on making reliable with dataset format determined Government was obtained from Amikom University. study, SVM will tested several variants algorithm handle imbalanced data. compared SMOTE, SMOTE-ENN, SMOTE-Tomek combined detect employability graduates. test carried out K-Fold Cross Validation, highest accuracy precision results produced SMOTE-ENN value 0.96 0.89.

Язык: Английский

Процитировано

13

Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method DOI
Ayhan Renklier, Serkan Öztürk

Multimedia Tools and Applications, Год журнала: 2023, Номер 83(5), С. 13929 - 13951

Опубликована: Июль 11, 2023

Язык: Английский

Процитировано

7

A blind recovery technique with integer wavelet transforms in image watermarking DOI Creative Commons
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar

и другие.

Engineering Science and Technology an International Journal, Год журнала: 2023, Номер 48, С. 101586 - 101586

Опубликована: Дек. 1, 2023

The development of internet technology has simplified the sharing and modification digital image information. aim this study is to propose a new blind recovery technique based on integer wavelets transform (BRIWT) by utilizing their content. LSB adjustment wavelet used embed data into two least significant bits (LSB) Authentication are embedded current locations content, while information different block proposed mapping. securely placed at random within LSBs using secret key. A three-layer embedding authentication validate integrity contents, achieving high precision accuracy. Tamper localization accuracy employed identify from This research also investigates inpainting method enhance tampered images. performed identifying non-tampered pixels in surrounding tamper localization. results demonstrate that scheme can produce highly watermarked images with imperceptibility, an average SSIM value 0.9978 PSNR 46.20 dB. significantly improves localization, 0.9943 0.9971. transforms achieves high-quality 0.9934 under tampering rate 10%. findings reveal quality 14.2 % 80 %.

Язык: Английский

Процитировано

7

An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity DOI
Zaid Bin Faheem, Danial Hanif, Farrukh Arslan

и другие.

Computers & Electrical Engineering, Год журнала: 2023, Номер 111, С. 108979 - 108979

Опубликована: Окт. 12, 2023

Язык: Английский

Процитировано

6