Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access


    A Text Image Watermarking Algorithm Based on Image Enhancement

    Baowei Wang1,*, Luyao Shen2, Junhao Zhang2, Zenghui Xu2, Neng Wang2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1183-1207, 2023, DOI:10.32604/cmc.2023.040307

    Abstract Digital watermarking technology is adequate for copyright protection and content authentication. There needs to be more research on the watermarking algorithm after printing and scanning. Aiming at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark, an anti-print scanning watermarking algorithm suitable for text images is proposed. This algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform (DWT)-Singular Value Decomposition (SVD) to… More >

  • Open Access


    Robust Image Watermarking Using LWT and Stochastic Gradient Firefly Algorithm

    Sachin Sharma1,*, Meena Malik2, Chander Prabha3, Amal Al-Rasheed4, Mona Alduailij4, Sultan Almakdi5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 393-407, 2023, DOI:10.32604/cmc.2023.033536

    Abstract Watermarking of digital images is required in diversified applications ranging from medical imaging to commercial images used over the web. Usually, the copyright information is embossed over the image in the form of a logo at the corner or diagonal text in the background. However, this form of visible watermarking is not suitable for a large class of applications. In all such cases, a hidden watermark is embedded inside the original image as proof of ownership. A large number of techniques and algorithms are proposed by researchers for invisible watermarking. In this paper, we focus on issues that are critical… More >

  • Open Access


    Fault Recognition of Multilevel Inverter Using Artificial Neural Network Approach

    Aravind Athimoolam1,*, Karthik Balasubramanian2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1331-1347, 2023, DOI:10.32604/iasc.2023.033465

    Abstract This paper focuses on the development of a diagnostic tool for detecting insulated gate bipolar transistor power electronic switch flaws caused by both open and short circuit faults in multi-level inverter time-frequency output voltage specifications. High-resolution laboratory virtual instrument engineering workbench software testing tool with a sample rate data collection system, as well as specialized signal processing and soft computing technologies, are used in this proposed method. On a single-phase cascaded H-bridge multilevel inverter, simulation and experimental investigations of both open and short issues of the insulated gate bipolar transistor components are performed out. In all conceivable switch issues, the… More >

  • Open Access


    Wavelet Based Detection of Outliers in Volatility Time Series Models

    Khudhayr A. Rashedi1,2,*, Mohd Tahir Ismail1, Abdeslam Serroukh3, S. Al wadi4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3835-3847, 2022, DOI:10.32604/cmc.2022.026476

    Abstract We introduce a new wavelet based procedure for detecting outliers in financial discrete time series. The procedure focuses on the analysis of residuals obtained from a model fit, and applied to the Generalized Autoregressive Conditional Heteroskedasticity (GARCH) like model, but not limited to these models. We apply the Maximal-Overlap Discrete Wavelet Transform (MODWT) to the residuals and compare their wavelet coefficients against quantile thresholds to detect outliers. Our methodology has several advantages over existing methods that make use of the standard Discrete Wavelet Transform (DWT). The series sample size does not need to be a power of 2 and the… More >

  • Open Access


    Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem

    Ramadhan J. Mstafa1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3349-3368, 2022, DOI:10.32604/cmc.2022.025791

    Abstract The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all… More >

  • Open Access


    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image steganography using discrete wavelet transform… More >

  • Open Access


    Research on Thunderstorm Identification Based on Discrete Wavelet Transform

    Xiaopeng Li1, Ziyuan Xu3,4, Jin Han1,*, Xingming Sun1,2, Yi Cao5

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1153-1166, 2022, DOI:10.32604/iasc.2022.023261

    Abstract Lightning has been one of the most talked-about natural disasters worldwide in recent years, as it poses a great threat to all industries and can cause huge economic losses. Thunderstorms are often accompanied by natural phenomena such as lightning strikes and lightning, and many scholars have studied deeply the regulations of thunderstorm generation, movement and dissipation to reduce the risk of lightning damage. Most of the current methods for studying thunderstorms focus on using more complex algorithms based on radar or lightning data, which increases the computational burden and reduces the computational efficiency to some extent. This paper proposes a… More >

  • Open Access


    Bidirectional Long Short-Term Memory Network for Taxonomic Classification

    Naglaa. F. Soliman1,*, Samia M. Abd Alhalem2, Walid El-Shafai2, Salah Eldin S. E. Abdulrahman3, N. Ismaiel3, El-Sayed M. El-Rabaie2, Abeer D. Algarni1, Fatimah Algarni4, Fathi E. Abd El-Samie1,2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 103-116, 2022, DOI:10.32604/iasc.2022.017691

    Abstract Identifying and classifying Deoxyribonucleic Acid (DNA) sequences and their functions have been considered as the main challenges in bioinformatics. Advances in machine learning and Deep Learning (DL) techniques are expected to improve DNA sequence classification. Since the DNA sequence classification depends on analyzing textual data, Bidirectional Long Short-Term Memory (BLSTM) algorithms are suitable for tackling this task. Generally, classifiers depend on the patterns to be processed and the pre-processing method. This paper is concerned with a new proposed classification framework based on Frequency Chaos Game Representation (FCGR) followed by Discrete Wavelet Transform (DWT) and BLSTM. Firstly, DNA strings are transformed… More >

  • Open Access


    Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features

    Marriam Nawaz1, Zahid Mehmood2,*, Tahira Nazir1, Momina Masood1, Usman Tariq3, Asmaa Mahdi Munshi4, Awais Mehmood1, Muhammad Rashid5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1927-1944, 2021, DOI:10.32604/cmc.2021.018052

    Abstract Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also uses discrete wavelet transform (DWT)… More >

  • Open Access


    Secure Image Authentication Using Watermarking and Blockchain

    Alsehli Abrar1, Wadood Abdul1,*, Sanaa Ghouzali2

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 577-591, 2021, DOI:10.32604/iasc.2021.016382

    Abstract Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied. Blockchain technology is a relatively new technology that has significant research potential related to image authentication. The watermark is embedded into the third-level discrete wavelet transform (DWT) in the middle frequency regions to achieve security and imperceptibility goals. Peak signal-to-noise ratio PSNR, structural similarity matrix (SSIM), normalized… More >

Displaying 1-10 on page 1 of 15. Per Page