Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (67)
  • Open Access

    ARTICLE

    Application of Zero-Watermarking for Medical Image in Intelligent Sensor Network Security

    Shixin Tu, Yuanyuan Jia, Jinglong Du*, Baoru Han*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 293-321, 2023, DOI:10.32604/cmes.2023.022308

    Abstract The field of healthcare is considered to be the most promising application of intelligent sensor networks. However, the security and privacy protection of medical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention. Fortunately, digital watermarking provides an effective method to solve this problem. In order to improve the robustness of the medical image watermarking scheme, in this paper, we propose a novel zero-watermarking algorithm with the integer wavelet transform (IWT), Schur decomposition and image block energy. Specifically, we first use IWT to extract low-frequency information and… More >

  • Open Access

    ARTICLE

    Adaptive Reversible Visible Watermarking Based on Total Variation for BTC-Compressed Images

    Hengfu Yang1,2,*, Mingfang Jiang1,2, Zhichen Gao3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5173-5189, 2023, DOI:10.32604/cmc.2023.034819

    Abstract Few previous Reversible Visible Watermarking (RVW) schemes have both good transparency and watermark visibility. An adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding (BTC) compressed domain, called TVB-RVW is proposed in this paper. A new mean image estimation method for BTC-compressed images is first developed with the help of Total Variation. Then, a visual perception factor computation model is devised by fusing texture and luminance characteristics. An adaptive watermark embedding strategy is used to embed the visible watermark with the effect of the visual perception factor in the BTC More >

  • Open Access

    ARTICLE

    A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT

    Yu Fan1,6, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Cheng Gong1, Jieren Cheng3,5, Yenwei Chen4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1279-1302, 2023, DOI:10.32604/cmc.2023.031445

    Abstract Medical images are a critical component of the diagnostic process for clinicians. Although the quality of medical photographs is essential to the accuracy of a physician’s diagnosis, they must be encrypted due to the characteristics of digital storage and information leakage associated with medical images. Traditional watermark embedding algorithm embeds the watermark information into the medical image, which reduces the quality of the medical image and affects the physicians’ judgment of patient diagnosis. In addition, watermarks in this method have weak robustness under high-intensity geometric attacks when the medical image is attacked and the watermarks… More >

  • Open Access

    ARTICLE

    High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security

    Wajdi Elhamzi1,2,*, Malika Jallouli3, Yassine Bouteraa1,4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4329-4347, 2022, DOI:10.32604/cmc.2022.030954

    Abstract Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source… More >

  • Open Access

    ARTICLE

    A Hybrid Security Framework for Medical Image Communication

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Ashraf A. M. Khalaf3, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2713-2730, 2022, DOI:10.32604/cmc.2022.028739

    Abstract Authentication of the digital image has much attention for the digital revolution. Digital image authentication can be verified with image watermarking and image encryption schemes. These schemes are widely used to protect images against forgery attacks, and they are useful for protecting copyright and rightful ownership. Depending on the desirable applications, several image encryption and watermarking schemes have been proposed to moderate this attention. This framework presents a new scheme that combines a Walsh Hadamard Transform (WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding (DRPE). First, on the More >

  • Open Access

    ARTICLE

    Securing Copyright Using 3D Objects Blind Watermarking Scheme

    Hussein Abulkasim1,*, Mona Jamjoom2, Safia Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5969-5983, 2022, DOI:10.32604/cmc.2022.027999

    Abstract Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used.… More >

  • Open Access

    ARTICLE

    Contourlet and Gould Transforms for Hybrid Image Watermarking in RGB Color Images

    Reena Thomas1,*, M. Sucharitha2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 879-889, 2022, DOI:10.32604/iasc.2022.024070

    Abstract The major intention of this work is to introduce a novel hybrid image watermarking technique for RGB color images. This hybrid watermarking algorithm uses two transforms such as Contourlet and Gould transform. The Contourlet transform is used as first stage while the Gould transform is used as second stage. In the watermark embedding phase, the R, G and B channels are transformed using Contourlet transform. The bandpass directional sub band coefficients of Contourlet transformed image are then divided into sub-blocks. The sub-blocks are then transformed using Gould transform and the watermark information is embedded on More >

  • Open Access

    ARTICLE

    A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS

    Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606

    Abstract Behind the popularity of multimedia technology, the dispute over image copyright is getting worse. In the digital watermark prevention technology for copyright infringement, watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership. Among the many digital watermarking technologies, zero watermarking technology has been favored in recent years. However, the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks, which may make the data too central, data storage security is low and copyright registration costs are… More >

  • Open Access

    ARTICLE

    Robust Watermarking of Screen-Photography Based on JND

    Siyu Gu1, Jin Han1,*, Xingming Sun1,2, Yi Cao1,3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4819-4833, 2022, DOI:10.32604/cmc.2022.023955

    Abstract With the popularity of smartphones, it is often easy to maliciously leak important information by taking pictures of the phone. Robust watermarking that can resist screen photography can achieve the protection of information. Since the screen photo process can cause some irreversible distortion, the currently available screen photo watermarks do not consider the image content well and the visual quality is not very high. Therefore, this paper proposes a new screen-photography robust watermark. In terms of embedding region selection, the intensity-based Scale-invariant feature transform (SIFT) algorithm used for the construction of feature regions based on… More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark… More >

Displaying 21-30 on page 3 of 67. Per Page