An Improved Tamper Detection with Iwt for Semi-Fragile Image Watermarking DOI
Agit Amrullah, Ferda Ernawan

Опубликована: Янв. 1, 2024

Today, the internet allows users to share images that may have been tampered with. This study proposes an improvement in tamper detection with semi-fragile image watermarking identify attacked images. The is transformed into second level of integer wavelet transform (IWT) generate a watermarked and detection. authentication bits are generated from bitwise XOR approximation coefficients (ACb) sub-band random binary matrix. Then, embedded horizontal detail coefficient (HCb) vertical (VCb) sub-band. At detection, cross-detect HCb VCb used After process, attack classification malicious incidental attacks computed using Normalized Hamming Similarity (NHS). If considered malicious, optimized algorithm improve technique uses neighbour calculate enhance process. experimental results show our proposed approach has improved accuracy precision detected perfectly between through scheme achieved 54.73 dB PSNR value SSIM 0.9987 for For method average 0.9714 F1-score 0.9705 various attacks. can achieve high 97.85% against collage attack, copy-paste object deletion attack.

Язык: Английский

A review of image watermarking for identity protection and verification DOI Creative Commons
Sunpreet Sharma, Ju Jia Zou, Gu Fang

и другие.

Multimedia Tools and Applications, Год журнала: 2023, Номер 83(11), С. 31829 - 31891

Опубликована: Сен. 19, 2023

Abstract Identity protection is an indispensable feature of any information security system. An identity can exist in the form digitally written signatures, biometric information, logos, etc. It serves vital purpose owners’ verification and provides them with a safety net against their imposters, so its essential. Numerous mechanisms are being developed to achieve this goal, embedding prominent among all. consists cryptography, steganography, watermarking; collectively, they known as data hiding (DH) techniques. In addition providing insight into various DH techniques, review prominently covers image watermarking works that have positively influenced relevant research area. To end, one main aspects study inclusive nature reviewing via which it aims provide 360 $$^{\circ }$$ view technology. The contributions summarised below. proposed more than 100 major field continue do so. This approach makes discussion effective allows us pivot on area instead just highlighting many existing methods possible. Moreover, also empowers readers current trends, pros cons state-of-the-art methods, recommendations for future works. works, solves issue reverse-engineering methods. For instance, most recent surveys focused primarily possible without probing actual working leave readership understanding implementing or method. especially prevalent newcomers field; hence, presents breakdown well-known A new systematisation classifying proposed. classifies techniques two phases. first phase divides three categories based domain employed during watermark embedding. further classified other attributes following phase.

Язык: Английский

Процитировано

24

AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation DOI
Afrig Aminuddin, Ferda Ernawan

Computers & Electrical Engineering, Год журнала: 2022, Номер 102, С. 108207 - 108207

Опубликована: Июнь 30, 2022

Язык: Английский

Процитировано

25

Sentiment Analysis of Covid-19 Vaccination using Support Vector Machine in Indonesia DOI Open Access
Majid Rahardi, Afrig Aminuddin, Ferian Fauzi Abdulloh

и другие.

International Journal of Advanced Computer Science and Applications, Год журнала: 2022, Номер 13(6)

Опубликована: Янв. 1, 2022

Along with the development of Covid-19 pandemic, many responses and news were shared through social media. The new vaccination promoted by government has raised pros cons from public. Public resistance to covid-19 will lead a higher fatality rate. This study carried out sentiment analysis about vaccine using Support Vector Machine (SVM). research aims public response acceptance program. result can be used determine direction policy. Data collection was taken via Twitter in year 2021. data then undergoes preprocessing methods. Afterward, is processed SVM classification. Finally, evaluated confusion matrix. experimental shows that produces 56.80% positive, 33.75% neutral, 9.45% negative. highest model accuracy obtained RBF kernel 92%, linear polynomial kernels 90% accuracy, sigmoid 89% accuracy.

Язык: Английский

Процитировано

24

Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images DOI Open Access
Ferda Ernawan, Afrig Aminuddin,

Danakorn Nincarean

и другие.

International Journal of Advanced Computer Science and Applications, Год журнала: 2022, Номер 13(4)

Опубликована: Янв. 1, 2022

Digital medical image has a potential to be manipulated by unauthorized persons due advanced communication technology. Verifying integrity and authenticity have become important issues on the image. This paper proposed self-embedding watermark using spiral block mapping for tamper detection restoration. The block-based coding with size of 3×3 was applied perform two authentication bits seven recovery bits. are obtained from set condition between sub-block image, parity each sub-block. embedded in least significant mapping. into different sub-blocks based watermarked images were tested under various tampered such as blurred unsharp-masking, copy-move, mosaic, noise, removal, sharpening. experimental results show that scheme achieved PSNR value about 51.29 dB SSIM 0.994 showed localization accuracy 93.8%. In addition, does not require external information able recover 40.45 0.994.

Язык: Английский

Процитировано

18

A novel color image tampering detection and self-recovery based on fragile watermarking DOI
Xiaofan Xia, Songsong Zhang,

Kunshu Wang

и другие.

Journal of Information Security and Applications, Год журнала: 2023, Номер 78, С. 103619 - 103619

Опубликована: Окт. 11, 2023

Язык: Английский

Процитировано

11

Facial Recognition Algorithms: A Systematic Literature Review DOI Creative Commons

N Fadel

Journal of Imaging, Год журнала: 2025, Номер 11(2), С. 58 - 58

Опубликована: Фев. 13, 2025

This systematic literature review aims to understand new developments and challenges in facial recognition technology. will provide an understanding of the system principles, performance metrics, applications technology various fields such as health, society, security from academic publications, conferences, industry news. A comprehensive approach was adopted technologies. It emphasizes most important techniques algorithm development, examines explores their fields. The mainly recent development deep learning techniques, especially CNNs, which greatly improved accuracy efficiency systems. findings reveal that there has been a noticeable evolution technology, with current use techniques. Nevertheless, it highlights challenges, including privacy concerns, ethical dilemmas, biases These factors highlight necessity using regulated manner. In conclusion, paper proposes several future research directions establish reliability systems reduce while building user confidence. considerations are key responsibly advancing by ensuring practices safeguarding privacy.

Язык: Английский

Процитировано

0

Face image authentication scheme based on MTCNN and SLT DOI
Rasha Thabit, Mohanad A. Al‐Askari, Dunya Zeki Mohammed

и другие.

Multimedia Tools and Applications, Год журнала: 2025, Номер unknown

Опубликована: Фев. 22, 2025

Язык: Английский

Процитировано

0

Efficient Fragile Watermarking for Image Tampering Detection using Adaptive Matrix on Chaotic Sequencing DOI Creative Commons
Prajanto Wahyu Adi, Aris Sugiharto,

Muhammad Malik Hakim

и другие.

Intelligent Systems with Applications, Год журнала: 2025, Номер unknown, С. 200530 - 200530

Опубликована: Май 1, 2025

Язык: Английский

Процитировано

0

Adaptive coefficient sorting and selection for high capacity data hiding in JPEG images DOI
Jeanne Chen, G.H. Su, Wien Hong

и другие.

Signal Image and Video Processing, Год журнала: 2025, Номер 19(7)

Опубликована: Май 13, 2025

Язык: Английский

Процитировано

0

A blind recovery technique with integer wavelet transforms in image watermarking DOI Creative Commons
Ferda Ernawan, Afrig Aminuddin, Suraya Abu Bakar

и другие.

Engineering Science and Technology an International Journal, Год журнала: 2023, Номер 48, С. 101586 - 101586

Опубликована: Дек. 1, 2023

The development of internet technology has simplified the sharing and modification digital image information. aim this study is to propose a new blind recovery technique based on integer wavelets transform (BRIWT) by utilizing their content. LSB adjustment wavelet used embed data into two least significant bits (LSB) Authentication are embedded current locations content, while information different block proposed mapping. securely placed at random within LSBs using secret key. A three-layer embedding authentication validate integrity contents, achieving high precision accuracy. Tamper localization accuracy employed identify from This research also investigates inpainting method enhance tampered images. performed identifying non-tampered pixels in surrounding tamper localization. results demonstrate that scheme can produce highly watermarked images with imperceptibility, an average SSIM value 0.9978 PSNR 46.20 dB. significantly improves localization, 0.9943 0.9971. transforms achieves high-quality 0.9934 under tampering rate 10%. findings reveal quality 14.2 % 80 %.

Язык: Английский

Процитировано

7