Learning-based image steganography and watermarking: A survey

K Hu, M Wang, X Ma, J Chen, X Wang… - Expert Systems with …, 2024 - Elsevier
Extensive research has been conducted on image steganography and watermarking
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …

[HTML][HTML] Secure watermarking schemes and their approaches in the IoT technology: an overview

R Wazirali, R Ahmad, A Al-Amayreh, M Al-Madi… - Electronics, 2021 - mdpi.com
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …

Digital watermarking-based cryptosystem for cloud resource provisioning

S Kumar, S Kumar, N Ranjan, S Tiwari… - International Journal of …, 2022 - igi-global.com
Cloud computing resource privacy is important and it becomes stronger when image-based
security is applied. Most cloud service providers provision resources for images to the end …

[PDF][PDF] New Fragile Watermarking Technique to Identify Inserted Video Objects Using H. 264 and Color Features.

R Ogla, ES Mahmood, RI Ahmed… - Computers, Materials & …, 2023 - researchgate.net
The transmission of video content over a network raises various issues relating to copyright
authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a …

An Analytical Analysis of the Present-Day Procedures for Disposing of Waste

BK Pandey, VK Nassa, D Pandey… - … of Research on Safe …, 2023 - igi-global.com
Population growth, urbanisation, industry, modernization, and digitalization increase
residential, industrial, commercial, mining, radioactive, agricultural, hospital, and electronic …

Video Data Authentication Using a Smart Contract Published on the Blockchain

NAA Moneim, MT Gaata - 2022 Fifth College of Science …, 2022 - ieeexplore.ieee.org
With the significant advancement in digital photo and video editing software, it is becoming
very easy to modify digital video content. However, because of the increased misuse of such …

Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images

A Kumar, A Kumar, G Khandelwal… - Journal of Discrete …, 2022 - Taylor & Francis
To enhance the security choices in transmission of information over the web, various
methods such as cryptography, steganography and digital watermarking have been …

A software/hardware secure watermarking scheme for Internet of Things applications

R Dalbouchi, A Zitouni - Multimedia Tools and Applications, 2023 - Springer
The security of applications that run over limited resources such as the Internet of Things
becomes a new challenge for researchers. Digital watermarking (WM) is among the …

Comprehensive review on video watermarking security threats, challenges, and its applications

I Joseph, J Mandala - ECS Transactions, 2022 - iopscience.iop.org
Data is a crucial resource for every business, and it must be protected both during storage
and transmission. One efficient way of securing data and transferring it is through digital …

[PDF][PDF] Robust and Secure Video Authentication: A Hash-Based Watermarking Approach

P Saini, R Ahuja - IAENG International Journal of Computer Science, 2024 - iaeng.org
While video is a vital component of modern communication, it also presents opportunities for
manipulation and unauthorized access. The preservation and authenticity of video footage …