Genetic algorithm based optimized watermarking technique using hybrid DCNN-SVR and statistical approach for watermark extraction

SA Barlaskar, SV Singh, K Anish Monsley… - Multimedia Tools and …, 2022 - Springer
This paper presents a watermark embedding and extraction technique using DWT-DCT
framework. In digital image watermarking, one of the major challenge is to provide adequate …

A Human Visual System-Based Blind Image Watermarking Scheme in the IWT-APDCBT Domain Integrating Geometric and Non-Geometric Distortion Correction …

SA Barlaskar, AM Kirupakaran, RH Laskar - Arabian Journal for Science …, 2024 - Springer
This work presents a robust digital image watermarking scheme to protect digital images
from illegal usage and manipulations. The excellent re-constructional attributes of integer …

Robust and imperceptible watermarking on medical images using coefficient pair modification

L Novamizanti, AB Suksmono… - IIUM Engineering …, 2023 - journals.iium.edu.my
Sensitive data including medical images and electronic patient records (EPR) have potential
value in the era of big data and telemedicine applications. Distribution of medical images …

[PDF][PDF] Pengamanan Data Teks Melalui Perpaduan Algoritma Beaufort dan Caesar Cipher

M Fadlan, S Sinawati, A Indriani… - Jurnal Teknik …, 2019 - academia.edu
Pentingnya menjaga keutuhan maupun keamanan data merupakan salah satu tantangan
dalam era digital saat ini. Salah satu cara yang dapat digunakan menghadapi tantangan ini …

[PDF][PDF] Survey on computational intelligence based image encryption techniques

TT Ramanathan, J Hossen… - … Journal of Electrical …, 2020 - pdfs.semanticscholar.org
Image encryption is an important area in visual cryptography that helps in protecting images
when shared through internet. There is lot of cryptography algorithms applied for many years …

Discrete Cosine Transform and Singular Value Decomposition Based on Canny Edge Detection for Image Watermarking

EZ Astuti, CA Sari, EH Rachmawanto… - Kinetik: Game …, 2023 - kinetik.umm.ac.id
The development of an increasingly sophisticated internet allows for the distribution of digital
images that can be done easily. However, with the development of increasingly …

Three Layer Encryption Protocol: an Approach of Super Encryption Algorithm

M Fadlan - … 3rd International Conference on Cybernetics and …, 2021 - ieeexplore.ieee.org
Data security is one of the critical things that must be considered along with the ease of the
data distribution process in Era Society 5.0. Maintaining data security is not an easy thing to …

ShiftMod cipher: A symmetrical cryptosystem scheme

A Salam, EH Rachmawanto… - … International Seminar on …, 2019 - ieeexplore.ieee.org
The security of storing and sending files and digital messages needs to be improved along
with technological developments. Encryption using cryptography is a solution that is widely …

An Image Watermarking Method Using Discrete Tchebichef Transform and Singular Value Decomposition Based on Chaos Embedding.

A Setyono… - International Journal of …, 2020 - search.ebscohost.com
A good watermarking method should be robust against attacks but have good visual quality.
This research proposes a combination of two transformations ie Tchebichef and singular …

Visual analysis based on CMY and RGB image cryptography using vigenere and beaufort cipher

CA Sari, DW Utomo, MAS Doheir - Kinetik: Game Technology …, 2023 - kinetik.umm.ac.id
The achievement of visual aspects and image security often cannot meet visibility standards,
for example the acquisition of PSNR and UACI NPCR values. To increase security, this …