A Melman, O Evsutin - Artificial Intelligence Review, 2023 - Springer
The digital content exchange on the Internet is associated with information security risks. Hiding data in digital images is a promising direction in data protection and is an alternative …
S Wang, B Yang, X Niu - J. Inf. Hiding Multim. Signal Process., 2010 - bit.kuas.edu.tw
With the extensive application of steganography, it is challenged by steganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the …
S Chaki, RN Bathe, S Ghosal… - Journal of Intelligent …, 2018 - Springer
The paper presents an integrated model of artificial neural networks (ANNs) and non- dominated sorting genetic algorithm (NSGAII) for prediction and optimization of quality …
This work presents an intelligent technique based on reversible watermarking for protecting patient and medical related information. In the proposed technique 'IRW-Med', the concept of …
HC Huang, WC Fang - Simulation Modelling Practice and Theory, 2010 - Elsevier
In this paper, we propose a practical application for copyright protection of images with watermarking. The EXIF metadata of images and error-control codes are integrated into our …
Authentication of medical data and reports is a significant issue for preparing, editing, and transmitting the patient report. Medical information transfer requires communication …
The Book presents an overview of newly developed watermarking techniques in various independent and hybrid domains Covers the basics of digital watermarking, its types …
Multimedia data is crucial in the military, medical, forensics, social, etc., to transmit a large amount of data. Security of this sensitive information is the primary issue. This paper uses …
HC Huang, CM Chu, JS Pan - Soft Computing, 2009 - Springer
Applications for robust watermarking is one of the major branches in digital rights management (DRM) systems and related researches. Based on existing experiences to …