Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Semi-Fragile Image Watermarking Using Quantization-Based DCT for Tamper Localization

    Agit Amrullah, Ferda Ernawan*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069229 - 09 December 2025

    Abstract This paper proposes a tamper detection technique for semi-fragile watermarking using Quantization-based Discrete Cosine Transform (DCT) for tamper localization. In this study, the proposed embedding strategy is investigated by experimental tests over the diagonal order of the DCT coefficients. The cover image is divided into non-overlapping blocks of size 8 × 8 pixels. The DCT is applied to each block, and the coefficients are arranged using a zig-zag pattern within the block. In this study, the low-frequency coefficients are selected to examine the impact of the imperceptibility score and tamper detection accuracy. High accuracy of… More >

  • Open Access

    ARTICLE

    Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery

    Qiuling Wu1,*, Hao Li1, Mingjian Li1, Ming Wang2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068220 - 10 November 2025

    Abstract Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright. However, in practical applications, this technology faces various problems such as severe image distortion, inaccurate localization of the tampered regions, and difficulty in recovering content. Given these shortcomings, a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed. The multi-feature watermarking authentication code (AC) is constructed using texture feature of local binary patterns (LBP), direct coefficient of discrete cosine transform (DCT) and contrast feature of gray level co-occurrence matrix (GLCM) for detecting the tampered region, and the… More >

  • Open Access

    ARTICLE

    Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform

    Maazen Alsabaan1, Zaid Bin Faheem2, Yuanyuan Zhu2, Jehad Ali3,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 491-512, 2025, DOI:10.32604/cmc.2025.064971 - 09 June 2025

    Abstract Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms. Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content. Image watermarking can also be used to verify the authenticity of digital media, such as images or videos, by ascertaining the watermark information. In this paper, a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform (DWT), chaotic map, and Laplacian operator. The DWT can be used to decompose… More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Based on DWT and RDWT Combined with Möbius Transformations

    Atheer Alrammahi1,2, Hedieh Sajedi1,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 887-918, 2025, DOI:10.32604/cmc.2025.063866 - 09 June 2025

    Abstract Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution, tampering, and copyright infringement. This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform (DWT), Redundant Discrete Wavelet Transform (RDWT), and Möbius Transformations (MT), with optimization of transformation parameters achieved via a Genetic Algorithm (GA). By combining frequency and spatial domain techniques, the proposed method significantly enhances both the imperceptibility and robustness of watermark embedding. The approach leverages DWT and RDWT for multi-resolution decomposition, enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks. RDWT,… More >

  • Open Access

    ARTICLE

    Secure Digital Image Watermarking Technique Based on ResNet-50 Architecture

    Satya Narayan Das1,2,*, Mrutyunjaya Panda2,*

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1073-1100, 2024, DOI:10.32604/iasc.2024.057013 - 30 December 2024

    Abstract In today’s world of massive data and interconnected networks, it’s crucial to burgeon a secure and efficient digital watermarking method to protect the copyrights of digital content. Existing research primarily focuses on deep learning-based approaches to improve the quality of watermarked images, but they have some flaws. To overcome this, the deep learning digital image watermarking model with highly secure algorithms is proposed to secure the digital image. Recently, quantum logistic maps, which combine the concept of quantum computing with traditional techniques, have been considered a niche and promising area of research that has attracted… More >

  • Open Access

    REVIEW

    Robust Deep Image Watermarking: A Survey

    Yuanjing Luo, Xichen Tan, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 133-160, 2024, DOI:10.32604/cmc.2024.055150 - 15 October 2024

    Abstract In the era of internet proliferation, safeguarding digital media copyright and integrity, especially for images, is imperative. Digital watermarking stands out as a pivotal solution for image security. With the advent of deep learning, watermarking has seen significant advancements. Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces, resilient to various attacks. These methods, characterized by a streamlined encoder-decoder architecture, have shown enhanced performance through the incorporation of novel training modules. This article offers an in-depth analysis of deep watermarking’s core technologies, current status, and prospective More >

  • Open Access

    ARTICLE

    An Intelligent Sensor Data Preprocessing Method for OCT Fundus Image Watermarking Using an RCNN

    Jialun Lin1, Qiong Chen1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1549-1561, 2024, DOI:10.32604/cmes.2023.029631 - 17 November 2023

    Abstract Watermarks can provide reliable and secure copyright protection for optical coherence tomography (OCT) fundus images. The effective image segmentation is helpful for promoting OCT image watermarking. However, OCT images have a large amount of low-quality data, which seriously affects the performance of segmentation methods. Therefore, this paper proposes an effective segmentation method for OCT fundus image watermarking using a rough convolutional neural network (RCNN). First, the rough-set-based feature discretization module is designed to preprocess the input data. Second, a dual attention mechanism for feature channels and spatial regions in the CNN is added to enable… More >

  • Open Access

    ARTICLE

    A Text Image Watermarking Algorithm Based on Image Enhancement

    Baowei Wang1,*, Luyao Shen2, Junhao Zhang2, Zenghui Xu2, Neng Wang2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1183-1207, 2023, DOI:10.32604/cmc.2023.040307 - 31 October 2023

    Abstract Digital watermarking technology is adequate for copyright protection and content authentication. There needs to be more research on the watermarking algorithm after printing and scanning. Aiming at the problem that existing anti-print scanning text image watermarking algorithms cannot take into account the invisibility and robustness of the watermark, an anti-print scanning watermarking algorithm suitable for text images is proposed. This algorithm first performs a series of image enhancement preprocessing operations on the printed scanned image to eliminate the interference of incorrect bit information on watermark embedding and then uses a combination of Discrete Wavelet Transform More >

  • Open Access

    ARTICLE

    A Novel Color Image Watermarking Method with Adaptive Scaling Factor Using Similarity-Based Edge Region

    Kali Gurkahraman1,*, Rukiye Karakis2, Hidayet Takci1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 55-77, 2023, DOI:10.32604/csse.2023.037798 - 26 May 2023

    Abstract This study aimed to deal with three challenges: robustness, imperceptibility, and capacity in the image watermarking field. To reach a high capacity, a novel similarity-based edge detection algorithm was developed that finds more edge points than traditional techniques. The colored watermark image was created by inserting a randomly generated message on the edge points detected by this algorithm. To ensure robustness and imperceptibility, watermark and cover images were combined in the high-frequency subbands using Discrete Wavelet Transform and Singular Value Decomposition. In the watermarking stage, the watermark image was weighted by the adaptive scaling factor More >

  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655 - 03 April 2023

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed… More >

Displaying 1-10 on page 1 of 16. Per Page