From classical to soft computing based watermarking techniques: A comprehensive review
With evolution of digital technology, it is challenging to protect personal data from access
without consent. Digital watermarking conceals some information as watermark to protect …
without consent. Digital watermarking conceals some information as watermark to protect …
A DWT-SVD based robust digital watermarking for medical image security
In this work, we propose a blind watermarking approach for medical image protection. In this
approach, the watermark will be constituted of the Electronic Patient Record and the image …
approach, the watermark will be constituted of the Electronic Patient Record and the image …
Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …
A new chaotic complex map for robust video watermarking
In this paper, using a new two-dimensional complex map, a secure video watermarking
system is presented. Standard analyzes have been performed to analyze a dynamical …
system is presented. Standard analyzes have been performed to analyze a dynamical …
Digital image scrambling based on a new one-dimensional coupled Sine map
This paper proposes a new one-dimensional chaotic map, called chaotic coupled Sine map
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …
(CCSM), for the scrambling and encryption processes. The purpose of the CCSM design is …
A recent survey on multimedia and database watermarking
In today's digital era, it is very easy to copy, manipulate and distribute multimedia data over
an open channel. Copyright protection, content authentication, identity theft, and ownership …
an open channel. Copyright protection, content authentication, identity theft, and ownership …
Cubic spline interpolation‐based robot path planning using a chaotic adaptive particle swarm optimization algorithm
J Lian, W Yu, K **ao, W Liu - Mathematical problems in …, 2020 - Wiley Online Library
This paper proposed a cubic spline interpolation‐based path planning method to maintain
the smoothness of moving the robot's path. Several path nodes were selected as control …
the smoothness of moving the robot's path. Several path nodes were selected as control …
A chaotic video steganography technique for carrying different types of secret messages
Increasing the security of data in insecure communication networks is the motivation of
researchers to propose different types of methods. Steganography is one of the security …
researchers to propose different types of methods. Steganography is one of the security …
A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection
With the growing use of the digital world and its associated challenges, the use of digital
watermarking is a popular and appropriate way of protecting digital content against illegal …
watermarking is a popular and appropriate way of protecting digital content against illegal …
Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT
Z Li, H Zhang, X Liu, C Wang, X Wang - Digital Signal Processing, 2021 - Elsevier
This study proposes a novel blind watermarking algorithm based on radial harmonic Fourier
moments (RHFMs) as well as discrete wavelet transform and discrete cosine transform …
moments (RHFMs) as well as discrete wavelet transform and discrete cosine transform …