A review of image watermarking for identity protection and verification

S Sharma, JJ Zou, G Fang, P Shukla, W Cai - Multimedia Tools and …, 2024 - Springer
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …

A comprehensive survey on image authentication for tamper detection with localization

HR Chennamma, B Madhushree - Multimedia Tools and Applications, 2023 - Springer
The data that is stored or transmitted in digital form is susceptible to be attacked. Digital
images are particularly vulnerable to unauthorized access and illicit alterations. As a result …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

Reversible image-hiding algorithm based on singular value sampling and compressive sensing

G Ye, H Wu, M Liu, X Huang - Chaos, Solitons & Fractals, 2023 - Elsevier
A reversible image-hiding algorithm based on a novel chaotic system is proposed using
compressive sensing (CS) and singular value sampling (SVS) techniques. In the first stage …

A multiwatermarking scheme for verifying medical image integrity and authenticity in the internet of medical things

F Yan, H Huang, X Yu - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the advent of a fifth-generation mobile network and developments in technologies such
as the Internet of Medical Things, smart healthcare systems are becoming ubiquitous in our …

An image security model based on chaos and DNA cryptography for IIoT images

AK Singh, K Chatterjee, A Singh - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The images generated by smart cameras and sensors in an Industrial Internet of Things
(IIoT) ecosystem are at significant risk when transmitted over a public network due to the …

ARWGAN: Attention-guided robust image watermarking model based on GAN

J Huang, T Luo, L Li, G Yang, H Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the existing deep learning-based watermarking models, extracted image features for
fusing with watermark are not abundant enough and more critically, and essential features …

RBWCI: Robust and blind watermarking framework for cultural images

S Mehraj, S Mushtaq, SA Parah, KJ Giri… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Heritage multimedia, which comprises images, audio, and videos, are precious artifacts of a
region. In addition to enabling a better understanding of earlier generations, heritage media …

A dual watermarking scheme for identity protection

S Sharma, JJ Zou, G Fang - Multimedia Tools and Applications, 2023 - Springer
A novel dual watermarking scheme with potential applications in identity protection, media
integrity maintenance and copyright protection in both electronic and printed media is …

WSOmark: An adaptive dual-purpose color image watermarking using white shark optimizer and Levenberg–Marquardt BPNN

S Kumar, NK Sharma, N Kumar - Expert Systems with Applications, 2023 - Elsevier
With the rapid progression in Internet technologies, content authentication and copyright
concerns have increased exponentially. To overcome these challenges, this paper proposes …