Copyright protection of deep neural network models using digital watermarking: a comparative study

A Fkirin, G Attiya, A El-Sayed, MA Shouman - Multimedia Tools and …, 2022 - Springer
Nowadays, deep learning achieves higher levels of accuracy than ever before. This
evolution makes deep learning crucial for applications that care for safety, like self-driving …

Two-level security approach combining watermarking and encryption for securing critical colored images

A Fkirin, G Attiya, A El-Sayed - Optical and Quantum Electronics, 2021 - Springer
With the widespread of the Internet and the rapid growth of technologies, several challenges
face data hiding process. Although watermarking is widely used to hide/embed critical data …

Hybrid two-level protection system for preserving pre-trained DNN models ownership

A Fkirin, AS Moursi, G Attiya, A El-Sayed… - Neural Computing and …, 2024 - Springer
Recent advancements in deep neural networks (DNNs) have made them indispensable for
numerous commercial applications. These include healthcare systems and self-driving cars …

[PDF][PDF] A comprehensive review on medical image steganography based on lsb technique and potential challenges

BA Shtayt, NH Zakaria, NH Harun - Baghdad Science Journal, 2021 - iasj.net
The rapid development of telemedicine services and the requirements for exchanging
medical information between physicians, consultants, and health institutions have made the …

[PDF][PDF] Video steganography using mid-point circle algorithm and spatial domain technique

MMS Rani, S Lakshmanan… - International Journal of …, 2018 - academia.edu
Recent advances in information innovation have made quick delivery and sharing of
interactive media information possible. In any case, these advances in innovation are …

[PDF][PDF] Adaptive Image Steganography in the Difference Value of Discrete Cosine Transform Coefficients

V Sabeti, S Ahmadi - Journal of Soft Computing and Information …, 2020 - academia.edu
Steganography is the science and art to conceal the existence of communication, by hiding
information in a digital media, the existence of communication is hidden from the enemy's …

МЕТОД ПРИМЕНЕНИЯ - ПОРОГОВОЙ СХЕМЫ В СТЕГАНОГАФИИ

АН Мироненко - Математические структуры и моделирование, 2018 - cyberleninka.ru
Работа посвящена разработке метода скрытия информации в растровом изображении
с использованием стеганографии совместно с криптографией. Предлагаемый метод …

Steganografi Citra Digital Menggunakan Pendekatan Least Significant Bit dan Discrete Cosine Transform

RFN Imanudin, I Kustiawan, S Elvyanti - Seminar Nasional Teknik …, 2023 - snte.fortei.org
Keamanan siber adalah salah satu aset terpenting yang harus dijaga selama proses
transmisi data melalui Internet. Salah satu strategi untuk melindungi informasi penting …

[PDF][PDF] A Comprehensive Review on Security of Medical Image in Telemedicine

AS Ridha, AT Hashim - iasj.net
Medical imaging is a sensitive and important type of data that requires robust encryption to
protect it during transmission over networks. Confidentiality is a critical aspect to consider …

State-of-the-art Survey of Data Hiding in ECG Signal

A Velinov, I Stojanovic, V Dimitrova - Balkan Journal of Applied …, 2021 - js.ugd.edu.mk
With the development of new communication technologies, the number of biomedical data
that is transmitted is constantly increasing. This is sensitive data and therefore it is very …