Image watermarking between conventional and learning-based techniques: a literature review

S Boujerfaoui, R Riad, H Douzi, F Ros, R Harba - Electronics, 2022 - mdpi.com
Currently, most transactions and exchanges are conducted through the Internet thanks to
technological tools, running the risk of the falsification and distortion of information. This is …

A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

Secure blind watermarking using Fractional-Order Lorenz system in the frequency domain

SH AbdElHaleem, SK Abd-El-Hafiz… - AEU-International Journal …, 2024 - Elsevier
This paper investigates two different blind watermarking systems in the frequency domain
with the development of a Pseudo Random Number Generator (PRNG), based on a …

SVIoT: a secure visual-IoT framework for smart healthcare

JA Kaw, S Gull, SA Parah - Sensors, 2022 - mdpi.com
The advancement of the Internet of Things (IoT) has transfigured the overlay of the physical
world by superimposing digital information in various sectors, including smart cities, industry …

A comprehensive approach to image protection in digital environments

W Villegas-Ch, J García-Ortiz, J Govea - Computers, 2023 - mdpi.com
Protecting the integrity of images has become a growing concern due to the ease of
manipulation and unauthorized dissemination of visual content. This article presents a …

Steganography on Color Images Using Least Significant Bit (LSB) Method

T Indriyani, S Nurmuslimah… - … on Neural Networks …, 2023 - atlantis-press.com
In some fields, high data security is required for data transmission. This raises concerns
about misuse of data to irresponsible parties. To protect it, efforts were made to hide factual …

Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping

CT Huang, CY Lin, CY Weng - Entropy, 2023 - mdpi.com
In this era of rapid information exchange in public networks, there is a risk to information
security. Data hiding is an important technique for privacy protection. Image interpolation is …

Hybrid deep learning based digital image watermarking using GAN-LSTM and adaptive gannet optimization techniques

SM Shedole, V Santhi - Multimedia Tools and Applications, 2024 - Springer
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate,
distribute and modify digital images with online editing software. Image security and privacy …

[PDF][PDF] Secure fragile watermarking based on Huffman encoding and optimal embedding strategy

M Zairi, T Boujiha, A Ouelli - Indon. J. Electr. Eng. Comput. Sci, 2023 - researchgate.net
Image watermarking is one of the most popular techniques used to assure information
security, integrity, and authenticity. Watermarking algorithms can be categorised, according …

Creating Digital Watermarks in Bitmap Images Using Lagrange Interpolation and Bezier Curves

A Yerimbetova, E Daiyrbayeva, E Merzlyakova… - Journal of …, 2023 - mdpi.com
The article is devoted to the introduction of digital watermarks, which formthe basis for
copyright protection systems. Methods in this area are aimed at embedding hidden markers …