A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection

E Farri, P Ayubi - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
With the growing use of the digital world and its associated challenges, the use of digital
watermarking is a popular and appropriate way of protecting digital content against illegal …

Digital watermarking techniques: Comparative analysis and robustness for real time applications

E Kumaraswamy, K Mahender, CR Prasad… - AIP Conference …, 2022 - pubs.aip.org
In this paper, a review is presented of academic literature regarding validating robustness
for various attacks on digital video watermarking techniques. As of late, the explosive growth …

Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection

H Jain, M Kumar, AM Joshi - Electrical Engineering, 2022 - Springer
Abstract The Internet of Things (IoT)-based advanced metering infrastructure (AMI) provides
real-time information from smart meters to both grid operators and customers. The meter …

Blind semi-fragile watermarking scheme for video authentication in video surveillance context

A Hammami, A Ben Hamida, C Ben Amar - Multimedia Tools and …, 2021 - Springer
With the development of advanced multimedia editing tools, numerous unauthorized
manipulations are easily doable to surveillance systems video files. Thus, video tamper …

A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map

E Farri, P Ayubi - Nonlinear Dynamics, 2018 - Springer
In the modern world, high-bandwidth internet access has led to the theft of all types of digital
data, including digital video, and their illegal distribution. The digital video watermarking …

Combined DWT–DCT-based video watermarking algorithm using Arnold transform technique

AM Joshi, S Gupta, M Girdhar, P Agarwal… - Proceedings of the …, 2017 - Springer
The communication has become faster and easier through the Internet. The creation and
delivery of various data (video, images, speech and audio) have grown by many fold …

VLSI implementation of reliable and secure face recognition system

V Sharma, AM Joshi - Wireless Personal Communications, 2022 - Springer
Biometric authentications systems are being recognized as the better way of securing data
or personal devices as they are unique. Face is considered the best way to authenticate …

Efficient FPGA implementation of corrected reversible contrast mapping algorithm for video watermarking

S Das, AK Sunaniya, R Maity, NP Maity - Microprocessors and …, 2020 - Elsevier
This paper analyses and rectifies the shortcomings of reversible contrast mapping (RCM)
algorithm for invisible watermarking. The proposed corrected RCM algorithm is tested by …

Device authentication in IoT using reconfigurable PUF

A Jain, AM Joshi - 2019 2nd IEEE Middle East and North Africa …, 2019 - ieeexplore.ieee.org
Internet of Things has gained popularity nowadays and it has been estimated that in next
decade more than 95% of the embedded devices would be connected to the internet. This …

Video watermarking technique using motion vectors to video authentication

S Dhahri, T Moulahi - Multimedia Tools and Applications, 2024 - Springer
With the increase in the number of communication networks and digital multimedia
technologies, ensuring the confidentiality of information has become increasingly important …