Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

Digital steganography and watermarking for digital images: A review of current research directions

O Evsutin, A Melman, R Meshcheryakov - IEEE Access, 2020 - ieeexplore.ieee.org
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …

A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD

K Balasamy, S Suganyadevi - Multimedia tools and …, 2021 - search.proquest.com
Nowadays secure medical image watermarking had become a stringent task in
telemedicine. This paper presents a novel medical image watermarking method by fuzzy …

Watermarking techniques for medical data authentication: a survey

A Anand, AK Singh - Multimedia Tools and Applications, 2021 - Springer
With the widespread growth of medical images and improved communication and computer
technologies in recent years, authenticity of the images has been a serious issue for E …

A DWT based watermarking approach for medical image protection

F Kahlessenane, A Khaldi, R Kafi, S Euschi - Journal of Ambient …, 2021 - Springer
In order to contribute to the security of medical image, we present in this paper a blind and
robust watermarking technique that allows the integration of the electronic patient's record …

An efficient optimal key based chaos function for medical image security

K Shankar, M Elhoseny, ED Chelvi… - IEEE …, 2018 - ieeexplore.ieee.org
With the rapid development in the field of medical image encryption, researchers analyzed a
number of encryption algorithms based on chaotic systems. But there is a difficulty lies, ie …

An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic—Tent map

P Ramasamy, V Ranganathan, S Kadry… - Entropy, 2019 - mdpi.com
Nowadays, the images are transferred through open channels that are subject to potential
attacks, so the exchange of image data requires additional security in many fields, such as …

Secure watermarking schemes and their approaches in the IoT technology: an overview

R Wazirali, R Ahmad, A Al-Amayreh, M Al-Madi… - Electronics, 2021 - mdpi.com
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …

Image watermarking using soft computing techniques: A comprehensive survey

OP Singh, AK Singh, G Srivastava, N Kumar - Multimedia Tools and …, 2021 - Springer
Image watermarking techniques are used to provide copyright protection and verify
ownership of media/entities. This technique refers to the concept of embedding of secret …

Transparency and trust in human-AI-interaction: The role of model-agnostic explanations in computer vision-based decision support

C Meske, E Bunde - Artificial Intelligence in HCI: First International …, 2020 - Springer
Abstract Computer Vision, and hence Artificial Intelligence-based extraction of information
from images, has increasingly received attention over the last years, for instance in medical …