An Improved Tamper Detection with Iwt for Semi-Fragile Image Watermarking DOI
Agit Amrullah, Ferda Ernawan

Опубликована: Янв. 1, 2024

Today, the internet allows users to share images that may have been tampered with. This study proposes an improvement in tamper detection with semi-fragile image watermarking identify attacked images. The is transformed into second level of integer wavelet transform (IWT) generate a watermarked and detection. authentication bits are generated from bitwise XOR approximation coefficients (ACb) sub-band random binary matrix. Then, embedded horizontal detail coefficient (HCb) vertical (VCb) sub-band. At detection, cross-detect HCb VCb used After process, attack classification malicious incidental attacks computed using Normalized Hamming Similarity (NHS). If considered malicious, optimized algorithm improve technique uses neighbour calculate enhance process. experimental results show our proposed approach has improved accuracy precision detected perfectly between through scheme achieved 54.73 dB PSNR value SSIM 0.9987 for For method average 0.9714 F1-score 0.9705 various attacks. can achieve high 97.85% against collage attack, copy-paste object deletion attack.

Язык: Английский

Digital to quantum watermarking: A journey from past to present and into the future DOI

Swapnaneel Dhar,

Aditya Kumar Sahu

Computer Science Review, Год журнала: 2024, Номер 54, С. 100679 - 100679

Опубликована: Сен. 14, 2024

Язык: Английский

Процитировано

7

Novel Integer Hahn Transform for Real-time Lossless Image Authentication in IoT: A 32-bit Microcontroller Implementation DOI Creative Commons
Achraf Daoui, Mohamed Yamni, Paweł Pławiak

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 131044 - 131064

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

1

User Experience Analysis of Student Assistant Application Using The Five Planes Method DOI

Rifda Faticha Alfa Aziza,

Afrig Aminuddin,

Anggi Nur Widianingsih

и другие.

Опубликована: Дек. 6, 2023

This study presents a comprehensive analysis of user experience (UX) in student assistant application using the Five Planes Method, structured approach UX design. Focusing on specific needs students, this research seeks to enhance usability and overall satisfaction application. The paper begins with detailed review related works design analysis, highlighting various methodologies frameworks field. methodology adopted involves which includes Strategy Plane, Scope Structure Skeleton Surface Plane. Each plane contributes unique aspect process, ensuring user-centric development approach. employs System Usability Scale (SUS) for empirical evaluation, validating efficacy Method improving experience. results indicate significant enhancement provides valuable insights into importance structured, user-focused development, particularly educational domain.

Язык: Английский

Процитировано

3

TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking DOI Creative Commons
Afrig Aminuddin, Ferda Ernawan,

Danakorn Nincarean

и другие.

Engineering Science and Technology an International Journal, Год журнала: 2024, Номер 56, С. 101790 - 101790

Опубликована: Авг. 1, 2024

This paper proposed two evaluation metrics of the tamper coincidence in a block map design for image watermarking. These are called Tamper Coincidence Block Ratio (TCBR) and Density (TCBD). A occurred authentication self-recovery when recovery data original location were tampered with simultaneously. high limits inpainting's capability to recover region, leading an imprecise recovered image. The ratio density may significantly affect final quality. Previously, researchers mentioned their experiment but did not evaluate it any metrics. They evaluated robustness technique based on quality using Peak Signal-to-Noise (PSNR) Structural Similarity Index Measure (SSIM). coincidences primarily affected by implemented researcher. Thus, TCBR TCBD provide valuable insight into design's effectiveness preventing coincidence. experimental result shows that values inversely proportional value leads low Therefore, this will help effective minimizing obtain highest

Язык: Английский

Процитировано

0

TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform DOI Creative Commons
Agit Amrullah, Ferda Ernawan, Anis Farihan Mat Raffei

и другие.

Engineering Science and Technology an International Journal, Год журнала: 2024, Номер 61, С. 101909 - 101909

Опубликована: Дек. 3, 2024

Язык: Английский

Процитировано

0

Securing Digital Images with Triple Watermarks: An Integer Wavelet Transform Approach DOI
Bharathi Chidirala, Bibhudendra Acharya, Bijayananda Patnaik

и другие.

Опубликована: Окт. 25, 2024

Язык: Английский

Процитировано

0

An Improved Tamper Detection with Iwt for Semi-Fragile Image Watermarking DOI
Agit Amrullah, Ferda Ernawan

Опубликована: Янв. 1, 2024

Today, the internet allows users to share images that may have been tampered with. This study proposes an improvement in tamper detection with semi-fragile image watermarking identify attacked images. The is transformed into second level of integer wavelet transform (IWT) generate a watermarked and detection. authentication bits are generated from bitwise XOR approximation coefficients (ACb) sub-band random binary matrix. Then, embedded horizontal detail coefficient (HCb) vertical (VCb) sub-band. At detection, cross-detect HCb VCb used After process, attack classification malicious incidental attacks computed using Normalized Hamming Similarity (NHS). If considered malicious, optimized algorithm improve technique uses neighbour calculate enhance process. experimental results show our proposed approach has improved accuracy precision detected perfectly between through scheme achieved 54.73 dB PSNR value SSIM 0.9987 for For method average 0.9714 F1-score 0.9705 various attacks. can achieve high 97.85% against collage attack, copy-paste object deletion attack.

Язык: Английский

Процитировано

0