Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (64)
  • Open Access

    ARTICLE

    A Robust Video Watermarking Scheme with Squirrel Search Algorithm

    Aman Bhaskar1, Chirag Sharma1, Khalid Mohiuddin2, Aman Singh1,*, Osman A. Nasr2, Mamdooh Alwetaishi3

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3069-3089, 2022, DOI:10.32604/cmc.2022.019866

    Abstract Advancement in multimedia technology has resulted in protection against distortion, modification, and piracy. For implementing such protection, we have an existing technique called watermarking but obtaining desired distortion level with sufficient robustness is a challenging task for watermarking in multimedia applications. In the paper, we proposed a smart technique for video watermarking associating meta-heuristic algorithms along with an embedding method to gain an optimized efficiency. The main aim of the optimization algorithm is to obtain solutions with maximum robustness, and which should not exceed the set threshold of quality. To represent the accuracy of the proposed scheme, we employ a… More >

  • Open Access

    ARTICLE

    Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

    Mohammad Alamgeer1, Fahd N. Al-Wesabi2,3,*, Huda G. Iskandar3,4, Imran Khan5, Nadhem Nemri6, Mohammad Medani6, Mohammed Abdullah Al-Hagery7, Ali Mohammed Al-Sharafi3,8

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2497-2513, 2022, DOI:10.32604/cmc.2022.018591

    Abstract Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection of English text. A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach. The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique… More >

  • Open Access

    ARTICLE

    Medical Image Transmission Using Novel Crypto-Compression Scheme

    Arwa Mashat1, Surbhi Bhatia2,*, Ankit Kumar3, Pankaj Dadheech3, Aliaa Alabdali4

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 841-857, 2022, DOI:10.32604/iasc.2022.021636

    Abstract The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging model based on particle swarm… More >

  • Open Access

    ARTICLE

    Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

    Hesham Alhumyani1,*, Ibrahim Alrube1, Sameer Alsharif1, Ashraf Afifi1, Chokri Ben Amar1, Hala S. El-Sayed2, Osama S. Faragallah3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4657-4673, 2022, DOI:10.32604/cmc.2022.020338

    Abstract The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes. We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes… More >

  • Open Access

    ARTICLE

    An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks

    Anwer Mustafa Hilal1,*, Fahd N. Al-Wesabi2,3, Mohammed Alamgeer4, Manar Ahmed Hamza1, Mohammad Mahzari5, Murad A. Almekhlafi6

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5583-5600, 2022, DOI:10.32604/cmc.2022.019686

    Abstract Due to the rapid increase in the exchange of text information via internet networks, the security and authenticity of digital content have become a major research issue. The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text. In this paper, an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on the Arabic text transmitted online via an Internet network. Towards this purpose, the accuracy of tampering detection and… More >

  • Open Access

    ARTICLE

    Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks

    Mesfer Al Duhayyim1, Manal Abdullah Alohali2, Fahd N. Al-Wesabi3,4, Anwer Mustafa Hilal5,*, Mohammad Medani3, Manar Ahmed Hamza5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2879-2894, 2022, DOI:10.32604/cmc.2022.019594

    Abstract The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet. The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques. The watermark key will be generated by utilizing the extracted features of the text analysis process using the third… More >

  • Open Access

    ARTICLE

    Secure Watermarking Scheme for Color DICOM Images in Telemedicine Applications

    Kamred Udham Singh1, Hatem Salem Abu-Hamatta2, Abhishek Kumar3, Achintya Singhal4, Mamoon Rashid5,*, A. K. Bashir6

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2525-2542, 2022, DOI:10.32604/cmc.2022.019302

    Abstract Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical issues, privacy, and copyright authenticity. The copyright protection of medical images is a significant issue in the medical field. Watermarking schemes are used to address these issues. A gray-level or binary image is used as a watermark frequently in color image watermarking schemes. In this paper, the authors propose a novel… More >

  • Open Access

    ARTICLE

    Video Identification Based on Watermarking Schemes and Visual Cryptography

    Maged Wafy1,2,*, Samr Gamal Zanaty1,3, Mahmoud Elkhouly1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 441-453, 2022, DOI:10.32604/csse.2022.018597

    Abstract Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques… More >

  • Open Access

    ARTICLE

    A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

    Ahmed S. Alghamdi1, Surayya Naz2, Ammar Saeed3, Eesa Al Solami1, Muhammad Kamran1,*, Mohammed Saeed Alkatheiri1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1585-1601, 2022, DOI:10.32604/cmc.2022.019936

    Abstract With widespread use of relational database in various real-life applications, maintaining integrity and providing copyright protection is gaining keen interest of the researchers. For this purpose, watermarking has been used for quite a long time. Watermarking requires the role of trusted third party and a mechanism to extract digital signatures (watermark) to prove the ownership of the data under dispute. This is often inefficient as lots of processing is required. Moreover, certain malicious attacks, like additive attacks, can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting… More >

Displaying 31-40 on page 4 of 64. Per Page