Digital image and video watermarking: methodologies, attacks, applications, and future directions

P Aberna, L Agilandeeswari - Multimedia Tools and Applications, 2024 - Springer
In recent years, internet technology has grown in advance, and multimedia data-sharing
growth rates have skyrocketed. As a result, protecting multimedia data in digital networks …

Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …

A Mehmood, A Shafique, M Alawida, AN Khan - IEEE access, 2024 - ieeexplore.ieee.org
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …

Editguard: Versatile image watermarking for tamper localization and copyright protection

X Zhang, R Li, J Yu, Y Xu, W Li… - Proceedings of the …, 2024 - openaccess.thecvf.com
In the era of AI-generated content (AIGC) malicious tampering poses imminent threats to
copyright integrity and information security. Current deep image watermarking while widely …

An intelligent and blind dual color image watermarking for authentication and copyright protection

SBB Ahmadi, G Zhang, M Rabbani, L Boukela… - Applied …, 2021 - Springer
In this paper, a blind dual watermarking scheme for color images is proposed by embedding
an invisible robust watermark to protect copyright, as well as a fragile watermark is …

A review of image watermarking for identity protection and verification

S Sharma, JJ Zou, G Fang, P Shukla, W Cai - Multimedia Tools and …, 2024 - Springer
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …

Agricultural data sharing and sustainable development of ecosystem based on block chain

L Zhu, F Li - Journal of Cleaner Production, 2021 - Elsevier
The development of modern science and information technology has promoted social
progress and created better conditions for the realization of smart agriculture. The core of …

An efficient approach for phishing detection using machine learning

E Gandotra, D Gupta - Multimedia security: algorithm development …, 2021 - Springer
The increasing number of phishing attacks is one of the major concerns of security
researchers today. The traditional tools for identifying phishing websites use signature …

Providing end-to-end security using quantum walks in IoT networks

AA Abd El-Latif, B Abd-El-Atty… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things acts an essential role in our everyday lives and it definitely has the
potential to grow on the importance and revolutionize our future. However, the present …

A security management framework for big data in smart healthcare

P Sarosh, SA Parah, GM Bhat, K Muhammad - Big Data Research, 2021 - Elsevier
Big Data analytics in the medical sector can assist medical professionals to facilitate
improvement in healthcare. With the help of data analysis, clinical images of patients can be …

Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF

D Awasthi, VK Srivastava - Multimedia Tools and Applications, 2023 - Springer
In this proposed work, a dual image watermarking algorithm is used to protect the data
against copyright violations. In this work, the DICOM image is used as a host image. Two …