A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability

L Rakhmawati, W Wirawan, S Suwadi - EURASIP Journal on Image and …, 2019 - Springer
The rapid developments of storage technology and information exchange encourage the
development of research in the field of information security. In the process of sending …

Design scheme of copyright management system based on digital watermarking and blockchain

Z Meng, T Morizumi, S Miyata… - 2018 IEEE 42nd Annual …, 2018 - ieeexplore.ieee.org
In the past, the improvement of digital copyright protection system based on digital
watermarking mainly focused on algorithms, while generation and storage of the watermark …

Blind robust image watermarking based on adaptive embedding strength and distribution of quantified coefficients

L Rakhmawati, W Wirawan, S Suwadi, C Delpha… - Expert Systems with …, 2022 - Elsevier
The image watermarking technique is a reliable method for protecting digital image rights.
The most widely used digital imaging format is the JPEG (joint photographic expert's group) …

[PDF][PDF] Securing Copyright Using 3D Objects Blind Watermarking Scheme.

H Abulkasim, M Jamjoom… - Computers, Materials & …, 2022 - cdn.techscience.cn
Recently, securing Copyright has become a hot research topic due to rapidly advancing
information technology. As a host cover, watermarking methods are used to conceal or …

Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing

I Al-Aiash, R Alquran, M AlJamal, A Alsarhan… - Multimedia Tools and …, 2024 - Springer
The contemporary context of abundant digital dissemination inherently gives rise to the need
for media protection and the clear identification of ownership rights. This paper responded to …

Cooperative secret sharing using QR codes and symmetric keys

YW Chow, W Susilo, J Tonien, E Vlahu-Gjorgievska… - Symmetry, 2018 - mdpi.com
Secret sharing is an information security technique where a dealer divides a secret into a
collection of shares and distributes these to members of a group. The secret will only be …

Image authentication using QR code watermarking approach based on image segmentation

X Liu, X Tang - 2020 IEEE 19th International Conference on …, 2020 - ieeexplore.ieee.org
The rapid development of multimedia technology has brought huge challenges regarding
the security of multimedia content. Digital watermarking is a widely-used form of protection …

DWT and QR code based watermarking for document DRM

N Cardamone, F d'Amore - International Workshop on Digital …, 2018 - Springer
This paper presents a digital rights protection scheme for every type of document presented
as an image, by using steps that use cryptography and watermarking. The entities involved …

Utilizing QR codes to verify the visual fidelity of image datasets for machine learning

YW Chow, W Susilo, J Wang, R Buckland… - Journal of Network and …, 2021 - Elsevier
Abstract Machine learning is becoming increasingly popular in modern technology and has
been adopted in various application areas. However, researchers have demonstrated that …

Dual anti-counterfeiting of QR code based on information encryption and digital watermarking

Y Xun, Z Li, X Zhong, S Li, J Su, K Zhang - Advances in Graphic …, 2019 - Springer
The QR code is widely used in modern internet life as its fast speed of response, large
capacity of information and the wide range of coding. Therefore, it's an important means to …