An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation

Y Gangadhar, VSG Akula, PC Reddy - Biomedical Signal Processing and …, 2018 - Elsevier
The importance of digital images in the field of health care made major impact in the recent
years. There is need for protecting the medical images from unauthorized usage and …

AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation

A Aminuddin, F Ernawan - Computers and Electrical Engineering, 2022 - Elsevier
This paper presents an image watermarking technique for authentication and self-recovery
called AuSR2. The AuSR2 scheme partitions the cover image into 3× 3 non-overlapping …

[PDF][PDF] Three layer authentications with a spiral block mapping to prove authenticity in medical images

F Ernawan, A Aminuddin, D Nincarean… - … Journal of Advanced …, 2022 - saiconference.com
Digital medical image has a potential to be manipulated by unauthorized persons due to
advanced communication technology. Verifying integrity and authenticity have become …

A secured data hiding using affine transformation in video steganography

M Ramalingam, NAM Isa, R Puviarasi - Procedia Computer Science, 2020 - Elsevier
Network security is the most essential aspect of information technology among today's
emerging digital technologies which demands secured communication of information. In this …

A novel data hiding scheme based on improved diamond encoding in IWT domain

H Zhang, S Sun, L Hu, F Meng - Multimedia Tools and Applications, 2023 - Springer
DE is applied into discrete wavelet transform (DWT) data hiding method for lower distortion.
However, it does not consider human vision sensitivity and cannot achieve accurate …

[HTML][HTML] Content authentication and tampering detection of Arabic text: an approach based on zero-watermarking and natural language processing

AM Hilal, FN Al-Wesabi, MA Hamza, M Medani… - Pattern Analysis and …, 2022 - Springer
Due to the rapid increase in exchange of text information via internet network, the security
and the reliability of the digital content has become a major research issue. The main …

Hilbert-Peano and Zigzag: Two Approaches Mapping Pattern of Digital Watermarking for Text Images Authentication

AA Ghani, SI Hisham, NW Arshad - … Conference on Software …, 2021 - ieeexplore.ieee.org
The wide increment of information and communication technology nowadays in line with the
usage of digital documents, the user from different organizations such as education, military …

[PDF][PDF] Evaluation of Spiral Pattern Watermarking Scheme for Common Attacks to Social Media Images

TB Li, JM Zain, IH Syifak, AA Usop - International Journal of …, 2022 - academia.edu
The 21st century might be considered the" boom" period for social networking due to the fast
expansion of social media use. In terms of user privacy and security regulations, a plethora …

Medical Image Authentication Using a Watermarking Technique in Cloud Computing

R Yadav, A Sharma - IoT and Cloud Computing-Based …, 2023 - taylorfrancis.com
In modern healthcare technology, innovative software for medical image processing has
increased great interest. It also provides an improved medical information and expand the …

Cloud system for encryption and authentication medical images

AA Jasım - 2018 - openaccess.altinbas.edu.tr
Lately, a great number of applications have emerged during the fast and continuous
development in the field of telecommunications. One such important application is a tele …