Robust, secure and semi-blind watermarking technique using flexible scaling factor in block-based wavelet algorithm

E Elbasi, N Mostafa, E Cina - Electronics, 2022 - mdpi.com
Multimedia security has received much attention recently because of the rapid transmission
of elements such as text, images, audio, video, software, animation and games. Security is …

Robust image watermarking in spatial domain utilizing features equivalent to svd transform

M Ali - Applied Sciences, 2023 - mdpi.com
In recent years, digital image watermarking has gained a significant amount of popularity
and developed into a crucial and essential tool for copyright protection, security, and the …

Robust digital image watermarking scheme with a fractional-order discrete-time chaotic scheme and DWT-SVD transform

K Hannoun, H Hamiche, M Lahdir, O Megherbi… - Physica …, 2024 - iopscience.iop.org
A robust digital image watermarking system with a fractional-order discrete-time chaotic
system and discrete wavelet transform-singular value decomposition is presented. The …

Digital watermarks for videos based on a locality-sensitive hashing algorithm

Y Sun, G Srivastava - Mobile Networks and Applications, 2023 - Springer
Sensitive information in images is can be leaked during attacks, resulting in the malicious
acquisition of personal information. To improve the robustness of attacking defence for video …

[PDF][PDF] Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption.

SRV Juvvanapudi, PR Kumar… - International Journal of …, 2024 - core.ac.uk
Insecure communication in digital image security and image storing are considered as
important challenges. Moreover, the existing approaches face problems related to improper …

BC-DERCP: Blockchain-based copyright protection mechanism for digital educational resources

G Zhao, H He, B Di, Q Guo - Education and Information Technologies, 2024 - Springer
With the rapid development of information technology, various online education platforms
support the sharing of digital educational resources. Because digital educational resources …

Uncertain Boundaries: Multidisciplinary Approaches to Copyright Issues in Generative AI

J Dzuong, Z Wang, W Zhang - arXiv preprint arXiv:2404.08221, 2024 - arxiv.org
In the rapidly evolving landscape of generative artificial intelligence (AI), the increasingly
pertinent issue of copyright infringement arises as AI advances to generate content from …

Enhancing security for document exchange using authentication and GAN encryption

AM Radhi, TM Hamdani, H Chabchoub… - Multimedia Tools and …, 2024 - Springer
The real threat to the privacy of a plain document exchanged over insecure channels is
content manipulation or eavesdropping by unauthorized parties. To protect a transferred …

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network

R Forgáč, M Očkay, M Javurek, B Badidová - Computing and Informatics, 2023 - cai.sk
This paper introduces a model for the authentication of large-scale images. The crucial
element of the proposed model is the optimized Pulse Coupled Neural Network. This neural …

Mobile Payment Authentication using QR Codes Based on Combined DCT-DWT Digital Watermarking Scheme

S Mandala, R Rukman, M Irsan - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Mobile Payment Authentication is a crucial component for ensuring the security of digital
financial transactions in today's world. It is imperative to explore innovative approaches to …