Fuzzy proximity-based robust data hiding scheme with interval threshold

PK Singh, B Jana, K Datta - Soft Computing, 2023 - Springer
Secret communication of sensitive data must progress in a trustworthy environment through
data hiding. Using Mamdani fuzzy logic to identify color proximity at the block level and a …

Discrete time chaotic maps with application to random bit generation

L Moysis, AT Azar, A Tutueva, DN Butusov… - Handbook of Research …, 2021 - igi-global.com
Chaotic behavior is a term that is attributed to dynamical systems whose solutions are highly
sensitive to initial conditions. This means that small perturbations in the initial conditions can …

[PDF][PDF] Digital Image Steganography in spatial domain: A critical study

HN Khalid, AHM Aman - Technol. Reports of Kansai University, 2020 - researchgate.net
Prevalent years have witnessed the rise in a plethora of data security issues that run across
the board from copyright to content security issues due to the multitudinous transmission and …

[PDF][PDF] Blind image watermarking scheme based on lowest energy contourlet transform coefficient and modified arnold cat/ikeda maps

JN Shehab, HA Abdulkadhim… - Indonesian Journal of …, 2021 - academia.edu
The widespread of global internet has led to the need for developing new methods of
protecting multimedia information from exploitation, alteration or forgery, illegal distribution …

[HTML][HTML] A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos

N Alexendre, NE Pascal, S Thierry, W Colince - Journal of Computer and …, 2021 - scirp.org
The advent of the Internet in these last years encouraged a considerable traffic of digital
images. In the sanitary field, precisely in telemedicine branch, medical images play a very …

Digital Watermarking Strategies for Healthcare Data Security: A Comprehensive Review and Analysis

A Kumari, H Madhukar, SA Haider… - … Trust Architectures in …, 2024 - igi-global.com
This chapter extensively delves into the realm of digital image watermarking, encompassing
comparisons with analogous information security methodologies, elucidations of watermark …

Research on blind watermarking algorithm of encrypted holographic 3d geographic information data based on mapping mechanism

H Xu, H Zhang, A Zhu, G Xu - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
In order to improve the accuracy and security of encrypted holographic 3D geographic
information data acquisition and improve the actual resolution of geographic information …

Color image copyright protection based on watermarking using machine learning in the wavelet-packets domain

HM Al-Otum - 2023 - researchsquare.com
Image watermarking technologies have been developed to meet the concerns in multimedia
copyright protection caused by the tremendous demand on multimedia sharing. In this work …

A robust digital image watermarking methodology using an ensemble-based classifier for mitigation of geometrical attacks

RK Verma, S Kumar, V Namdeo - Mathematical Statistician and …, 2022 - philstat.org
Digital watermarking is an effective approach to the problem of copyright protection, thus
maintaining the security of digital products on the network. Recently, several machine …

Analysis of DNA Image Encryption Effect by Logistic-Sine System Combined with Fractional Chaos Stability Theory.

Z Si, W Wei, B Li, W Feng - Journal of Imaging Science & …, 2020 - search.ebscohost.com
To explore the DNA image encryption method based on the Logistic-sine system and the
fractional-order chaos stability theory, a fractional-order fuzzy differential equation is first …