SECURING OF IMAGES FROM UNAUTHORIZED USE BASED ON EMBEDDING IN THE SPATIAL DOMAIN DOI Open Access
А.Н. Земцов,

K.Z. Chan

Современные наукоемкие технологии (Modern High Technologies), Год журнала: 2022, Номер 2(№12 2022), С. 211 - 216

Опубликована: Янв. 1, 2022

технический университет», Волгоград, e-mail:

Язык: Английский

Blockchain technology: Applied to big data in collaborative edges DOI Creative Commons
Kamal Saluja, Sunil Gupta, Amit Vajpayee

и другие.

Measurement Sensors, Год журнала: 2022, Номер 24, С. 100521 - 100521

Опубликована: Окт. 22, 2022

End users are now encircled by an ever-increasing volume of information from edge devices relevant to a range stakeholders, thanks the introduction computing in variety application domains. However, because their distrust, these unable communicate significant amounts data. The non-repudiation and non-tampering features block chain used this study provide trust collaborative edges. To address limited processing capabilities devices, create chain-based huge data sharing architecture cooperative Then, for high computational reduction, propose Proof-of-Collaboration consensus technique, which participate formation giving PoC credits. Furthermore, useless transaction filter technique was proposed offloading, drastically decreasing chain's storage space Comprehensive tests carried out illustrate our proposal's better performance. Using learning opportunity environment friendly sustainable infrastructure be created developing countries.

Язык: Английский

Процитировано

25

An Optimized Deep Fusion Convolutional Neural Network-Based Digital Color Image Watermarking Scheme for Copyright Protection DOI
Manish Rai, Sachin Goyal,

Mahesh Pawar

и другие.

Circuits Systems and Signal Processing, Год журнала: 2023, Номер 42(7), С. 4019 - 4050

Опубликована: Фев. 6, 2023

Язык: Английский

Процитировано

17

A Robust Zero-Watermarking Scheme in Spatial Domain by Achieving Features Similar to Frequency Domain DOI Open Access
Musrrat Ali, Sanoj Kumar

Electronics, Год журнала: 2024, Номер 13(2), С. 435 - 435

Опубликована: Янв. 20, 2024

In recent years, there has been a substantial surge in the application of image watermarking, which evolved into an essential tool for identifying multimedia material, ensuring security, and protecting copyright. Singular value decomposition (SVD) discrete cosine transform (DCT) are widely utilized digital watermarking despite considerable computational burden they involve. By combining block-based direct current (DC) values with matrix norm, this research article presents novel, robust zero-watermarking approach. It generates zero-watermark without attempting to modify contents image. The is partitioned non-overlapping blocks, DC computed applying DCT. This sub-image further maximum singular each block calculated by norm instead SVD obtain binary feature matrix. A piecewise linear chaotic map encryption technique improve security watermark After that, created via XOR procedure between encrypted proposed scheme tested using variety distortion attacks including noise, filter, geometric, compression attacks. also compared other relevant methods outperformed them most cases.

Язык: Английский

Процитировано

5

A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT DOI Creative Commons
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva

и другие.

Applied Sciences, Год журнала: 2023, Номер 13(14), С. 8430 - 8430

Опубликована: Июль 21, 2023

Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of image’s quality utmost importance, medical images, where improper embedding watermark could change patient’s diagnosis. On other hand, distributed over Internet, owner must also be protected. In this work, an imperceptible, robust, secure, and hybrid presented It based on Hermite Transform (HT) Discrete Cosine (DCT) as spatial–frequency representation grayscale image. Besides, it uses block-based strategy perfectibility analysis best regions inspired by Human Vision System (HVS), giving imperceptibility watermark, Singular-Value Decomposition (SVD) approach improved robustness against attacks. addition, proposed method can two watermarks, binary (LOGO) information about technical data original text format (MetaData). To secure both Jigsaw (JST) Elementary Cellular Automaton (ECA) encrypt LOGO random sequence generator XOR operation MetaData. was tested using public dataset 49 assess effectiveness extraction procedures. Furthermore, evaluated under several processing geometric demonstrate its majority, intentional or unintentional, attacks, comparison made with state-of-the-art techniques. The obtained average values PSNR = 40.2051 dB, NCC 0.9987, SSIM 0.9999, MSSIM 0.9994 watermarked case LOGO, proposal gave MSE 0, ≫ 60 1, whereas, MetaData extracted, BER 0% Berror=0. Finally, encryption large key space (K=1.2689×1089)

Язык: Английский

Процитировано

9

Fuzzifier Point Estimation Using the Genetic Algorithm to Improve Image Watermarking DOI

Fatemeh Nassaj,

Mohammad Amin,

Ehsan Amiri

и другие.

SN Computer Science, Год журнала: 2025, Номер 6(5)

Опубликована: Апрель 24, 2025

Язык: Английский

Процитировано

0

Efficient Fragile Watermarking for Image Tampering Detection using Adaptive Matrix on Chaotic Sequencing DOI Creative Commons
Prajanto Wahyu Adi, Aris Sugiharto,

Muhammad Malik Hakim

и другие.

Intelligent Systems with Applications, Год журнала: 2025, Номер unknown, С. 200530 - 200530

Опубликована: Май 1, 2025

Язык: Английский

Процитировано

0

Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map DOI Creative Commons

Weishuai Wu,

Yujiao Dong, Guangyi Wang

и другие.

Complexity, Год журнала: 2024, Номер 2024, С. 1 - 18

Опубликована: Май 15, 2024

The existing watermarking algorithms make it difficult to balance the invisibility and robustness of watermark. This paper proposes a robust image method based on discrete wavelet transform (DWT), singular value decomposition (SVD), chaotic maps. is semiblind method. First, logistic-tent map introduced, employing an extensive parameter domain. amalgamated with Arnold’s transformation encrypt watermark image, thereby bolstering security information. Subsequently, frequency domain obtained by applying DWT carrier image. Embedding watermarks in ensures watermark, preference for high-frequency subband after enhanced robustness. SVD then applied both encrypted final step involves embedding values into image’s values, completing information process. In simulation experiments, test was conducted various images, yielding peak signal-to-noise ratio (PSNR) consistently exceeding 43, structural similarity (SSIM) close 1. Robustness testing against types attacks resulted normalized correlation (NC) surpassing 0.9, bit error rate (BER) approaching 0. conclusion, proposed algorithm satisfies imperceptibility requirements while demonstrating formidable

Язык: Английский

Процитировано

2

Robust Image Watermarking in Spatial Domain Utilizing Features Equivalent to SVD Transform DOI Creative Commons
Musrrat Ali

Applied Sciences, Год журнала: 2023, Номер 13(10), С. 6105 - 6105

Опубликована: Май 16, 2023

In recent years, digital image watermarking has gained a significant amount of popularity and developed into crucial essential tool for copyright protection, security, the identification multimedia content. Despite its high computational complexity, singular value decomposition (SVD) is an extensively utilized transformation in watermarking. This research presents robust blind scheme that directly alters pixels spatial domain to incorporate watermark by quantizing block-wise invariant maximum value. Using distribution rule, from cover are redistributed obtain new divided square non-overlapping blocks values using matrix 2-norm without performing SVD transform. modifies such outcome equivalent difference between corresponding covers watermarked images. The strengths proposed approach highlighted comparison experimental results with most comparable approaches.

Язык: Английский

Процитировано

5

Efficient large invisible color watermark embedding using conditional deep autoencoder model for medical applications DOI Creative Commons

Konka Kishan,

B. Vijay Kumar

Measurement Sensors, Год журнала: 2023, Номер 29, С. 100850 - 100850

Опубликована: Июнь 26, 2023

The widespread availability of the internet, in conjunction with very low-cost digital recording and storage devices, has ushered an age which reproduction, illegal use, malicious dissemination information have become much more straightforward. Authentication multimedia materials garnered a lot interest recent days as means preventing usage, theft, misrepresentation content. Invisible watermarking tries to hide medium order demonstrate ownership, integrity, or secret message. goal invisible is watermark extract it without making evident that cover image watermarked. This paper presents technique can large color water marks media. proposed model uses Conditional Variational Autoencoder (CVAE) encode into image. watermarked then decoded at receiver watermark. Unlike conventional techniques simple, small black white watermark, embed full images watermarks images. makes superior existing models by hiding stego produced high PSNR greater than 40 for different are visually indistinct from original

Язык: Английский

Процитировано

3

Security Protection of 3D Models of Oblique Photography by Digital Watermarking and Data Encryption DOI Creative Commons
Yaqin Jiao, Cong Ma, Juhua Luo

и другие.

Applied Sciences, Год журнала: 2023, Номер 13(24), С. 13088 - 13088

Опубликована: Дек. 7, 2023

To clarify the copyrights of 3D models oblique photography (3DMOP) and guarantee their security, a novel security protection scheme 3DMOP was proposed in this study by synergistically applying digital watermarking data encryption. In scheme, point clouds were clustered first, then centroid feature points each cluster calculated extracted, respectively. Afterward, watermarks embedded into cluster-by-cluster, taking distances between centroids as embedding positions. addition, also using texture coordinates to further enhance robustness algorithm. Furthermore, Arnold transformation performed on images for classified or sensitive information. Experimental results have verified strong imperceptibility algorithm, well high designed encryption The outcomes work can refine current methods thus expand application scope.

Язык: Английский

Процитировано

3