Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    A Robust Image Watermarking Based on DWT and RDWT Combined with Möbius Transformations

    Atheer Alrammahi1,2, Hedieh Sajedi1,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 887-918, 2025, DOI:10.32604/cmc.2025.063866 - 09 June 2025

    Abstract Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution, tampering, and copyright infringement. This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform (DWT), Redundant Discrete Wavelet Transform (RDWT), and Möbius Transformations (MT), with optimization of transformation parameters achieved via a Genetic Algorithm (GA). By combining frequency and spatial domain techniques, the proposed method significantly enhances both the imperceptibility and robustness of watermark embedding. The approach leverages DWT and RDWT for multi-resolution decomposition, enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks. RDWT,… More >

  • Open Access

    ARTICLE

    Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking

    Shu-Chuan Chu1,2, Libin Fu2, Jeng-Shyang Pan2,3, Xingsi Xue4, Min Liu5,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3135-3163, 2025, DOI:10.32604/cmc.2025.062469 - 16 April 2025

    Abstract Evolutionary algorithms have been extensively utilized in practical applications. However, manually designed population updating formulas are inherently prone to the subjective influence of the designer. Genetic programming (GP), characterized by its tree-based solution structure, is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems. This paper introduces a GP-based framework (GP-EAs) for the autonomous generation of update formulas, aiming to reduce human intervention. Partial modifications to tree-based GP have been instigated, encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.… More >

  • Open Access

    ARTICLE

    Joint Watermarking and Encryption for Social Image Sharing

    Conghuan Ye1,*, Shenglong Tan1, Shi Li1, Jun Wang1, Qiankun Zuo1, Bing Xiong2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2927-2946, 2025, DOI:10.32604/cmc.2025.062051 - 16 April 2025

    Abstract With the fast development of multimedia social platforms, content dissemination on social media platforms is becoming more popular. Social image sharing can also raise privacy concerns. Image encryption can protect social images. However, most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain. In this work, the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption. First, the fingerprint code with a hierarchical community structure is designed based on social network analysis. Then, discrete wavelet transform (DWT) from block discrete cosine transform (DCT) directly… More >

  • Open Access

    ARTICLE

    CSRWA: Covert and Severe Attacks Resistant Watermarking Algorithm

    Balsam Dhyia Majeed1,2, Amir Hossein Taherinia1,*, Hadi Sadoghi Yazdi1, Ahad Harati1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1027-1047, 2025, DOI:10.32604/cmc.2024.059789 - 03 January 2025

    Abstract Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright. The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification. Some of these features are important perceptual features according to the human visual system (HVS), which means that the embedded watermark should be imperceptible in these features. Therefore, both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions. The two roles will be considered in this paper… More >

  • Open Access

    REVIEW

    Enhancing Deepfake Detection: Proactive Forensics Techniques Using Digital Watermarking

    Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 73-102, 2025, DOI:10.32604/cmc.2024.059370 - 03 January 2025

    Abstract With the rapid advancement of visual generative models such as Generative Adversarial Networks (GANs) and stable Diffusion, the creation of highly realistic Deepfake through automated forgery has significantly progressed. This paper examines the advancements in Deepfake detection and defense technologies, emphasizing the shift from passive detection methods to proactive digital watermarking techniques. Passive detection methods, which involve extracting features from images or videos to identify forgeries, encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics. In contrast, proactive digital watermarking techniques embed specific markers into images or videos, facilitating More >

  • Open Access

    ARTICLE

    Digital Text Document Watermarking Based Tampering Attack Detection via Internet

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 759-771, 2024, DOI:10.32604/csse.2023.037305 - 20 May 2024

    Abstract Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem. Tampering detection, Content authentication, and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies. The authors’ difficulties were tampering detection, authentication, and integrity verification of the digital contents. This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection (ADMDTW-TAD) via the Internet. The DM concept is exploited in the presented… More >

  • Open Access

    ARTICLE

    High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security

    Wajdi Elhamzi1,2,*, Malika Jallouli3, Yassine Bouteraa1,4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4329-4347, 2022, DOI:10.32604/cmc.2022.030954 - 16 June 2022

    Abstract Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source… More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684 - 14 January 2022

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark… More >

  • Open Access

    ARTICLE

    Local Features-Based Watermarking for Image Security in Social Media

    Shady Y. El-mashad1, Amani M. Yassen1, Abdulwahab K. Alsammak1, Basem M. Elhalawany2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3857-3870, 2021, DOI:10.32604/cmc.2021.018660 - 24 August 2021

    Abstract The last decade shows an explosion of using social media, which raises several challenges related to the security of personal files including images. These challenges include modifying, illegal copying, identity fraud, copyright protection and ownership of images. Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes. In this paper, we propose a hybrid digital watermarking and image processing approach to improve the image security level. Specifically, variants of the widely used Least-Significant Bit (LSB) watermarking technique are merged with a blob detection algorithm to embed More >

  • Open Access

    ARTICLE

    A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19

    Xiaorui Zhang1, 2, *, Wenfang Zhang1, Wei Sun2, Tong Xu1, Sunil Kumar Jha3

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1435-1452, 2020, DOI:10.32604/cmc.2020.011359 - 30 June 2020

    Abstract In the current dire situation of the corona virus COVID-19, remote consultations were proposed to avoid cross-infection and regional differences in medical resources. However, the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry. To ensure the integrity and security of medical images, this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest (ROI) and integer wavelet transform (IWT). First, the medical image is divided into two different parts, regions of interest and non-interest… More >

Displaying 1-10 on page 1 of 12. Per Page