ANFIS optimization-based watermarking for securing integrity of medical images with blockchain authentication

D Awasthi, P Khare, VK Srivastava, AK Singh - Computers and Electrical …, 2024‏ - Elsevier
In the current scenario, medical records (MR) transmission has become a popular way for
smart healthcare systems to provide suitable treatment to several patients. Confidentiality of …

Digital twin heuristic positioning of insulation in multimodal electric systems

A Sikora, A Zielonka, MF Ijaz… - IEEE Transactions on …, 2024‏ - ieeexplore.ieee.org
We present a diagnostic method which uses a fuzzy voltage wave to test the insulation
systems. Proposed solution can be used in diagnostics of electrical machines and devices …

Empowering semantic segmentation with selective frequency enhancement and attention mechanism for tampering detection

X Xu, W Lv, W Wang, Y Zhang… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while
tampered images are also flooding the social networks. Tampering detection is therefore …

Deep learning-based segmentation for medical data hiding with Galois field

P Amrit, KN Singh, N Baranwal, AK Singh… - Neural Computing and …, 2023‏ - Springer
Data hiding is of the utmost importance for protecting the copyright of image content, given
the widespread use of images in the healthcare domain. Presently, medical image security …

Copyright protection of medical images: A view of the state-of-the-art research and current developments

J Kumar, AK Singh - Multimedia Tools and Applications, 2023‏ - Springer
Recently, copyright protection of medical images has been critical, and even small changes
can endanger the life of a patient. To verify the authenticity of these images, digital …

Deep learning-based image encryption techniques: fundamentals, current trends, challenges and future directions

OP Singh, KN Singh, AK Singh, AK Agrawal - Neurocomputing, 2025‏ - Elsevier
In recent years, the number of digital images has grown exponentially because of the
widespread use of fast internet and smart devices. The integrity authentication of these …

Towards data fusion-based big data analytics for intrusion detection

F Jemili - Journal of Information and Telecommunication, 2023‏ - Taylor & Francis
Intrusion detection is seen as the most promising way for computer security. It is used to
protect computer networks against different types of attacks. The major problem in the …

Screen-shooting watermarking algorithm based on Harris-SIFT feature regions

Z Gan, X Zheng, Y Song, X Chai - Signal, Image and Video Processing, 2024‏ - Springer
In recent years, there has been an increasing concern regarding the security and copyright
issues associated with images. Unscrupulous individuals exploit electronic images through …

Air Pollution Monitoring By Integrating Local and Global Information in Self-Adaptive Multiscale Transform Domain

K Gu, Y Liu, H Liu, B Liu, J Qiao, W Lin… - IEEE Transactions on …, 2025‏ - ieeexplore.ieee.org
As the deadliest form of pollution, air pollution had a prolonged severe damage to the
human health and life safety of nearly 99% of the world's population. Facing to the problem …

A new block selection strategy from LU decomposition domain for robust image watermarking

N Phuong Thi, T Ta Minh - Multimedia Tools and Applications, 2024‏ - Springer
The piracy of digital products has become an urgent problem to be solved. Robust
watermarking is a promising technique for copyright protection. To go against rapidly …