Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Semi-Fragile Image Watermarking Using Quantization-Based DCT for Tamper Localization

    Agit Amrullah, Ferda Ernawan*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069229 - 09 December 2025

    Abstract This paper proposes a tamper detection technique for semi-fragile watermarking using Quantization-based Discrete Cosine Transform (DCT) for tamper localization. In this study, the proposed embedding strategy is investigated by experimental tests over the diagonal order of the DCT coefficients. The cover image is divided into non-overlapping blocks of size 8 × 8 pixels. The DCT is applied to each block, and the coefficients are arranged using a zig-zag pattern within the block. In this study, the low-frequency coefficients are selected to examine the impact of the imperceptibility score and tamper detection accuracy. High accuracy of… More >

  • Open Access

    ARTICLE

    Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery

    Qiuling Wu1,*, Hao Li1, Mingjian Li1, Ming Wang2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068220 - 10 November 2025

    Abstract Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright. However, in practical applications, this technology faces various problems such as severe image distortion, inaccurate localization of the tampered regions, and difficulty in recovering content. Given these shortcomings, a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed. The multi-feature watermarking authentication code (AC) is constructed using texture feature of local binary patterns (LBP), direct coefficient of discrete cosine transform (DCT) and contrast feature of gray level co-occurrence matrix (GLCM) for detecting the tampered region, and the… More >

  • Open Access

    ARTICLE

    Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence

    Fatima Abu Siryeh*, Hussein Alrammahi, Abdullahi Abdu İbrahim

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5021-5046, 2025, DOI:10.32604/cmc.2025.065206 - 30 July 2025

    Abstract Biometric template protection is essential for finger-based authentication systems, as template tampering and adversarial attacks threaten the security. This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication. The system was tested against NIST SD4 and Anguli fingerprint datasets, wherein 10,000 watermarked fingerprints were employed for training. The designed approach recorded a tamper detection rate of 98.3%, performing 3–6% better than current DCT, SVD, and DWT-based watermarking approaches. The false positive rate (≤1.2%) and false negative rate (≤1.5%) were much lower compared to previous… More >

  • Open Access

    ARTICLE

    How Software Engineering Transforms Organizations: An Open and Qualitative Study on the Organizational Objectives and Motivations in Agile Transformations

    Alonso Alvarez, Borja Bordel Sánchez*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2935-2966, 2024, DOI:10.32604/cmc.2024.056990 - 18 November 2024

    Abstract Agile Transformations are challenging processes for organizations that look to extend the benefits of Agile philosophy and methods beyond software engineering. Despite the impact of these transformations on organizations, they have not been extensively studied in academia. We conducted a study grounded in workshops and interviews with 99 participants from 30 organizations, including organizations undergoing transformations (“final organizations”) and companies supporting these processes (“consultants”). The study aims to understand the motivations, objectives, and factors driving and challenging these transformations. Over 700 responses were collected to the question and categorized into 32 objectives. The findings show More >

  • Open Access

    ARTICLE

    Towards Improving the Quality of Requirement and Testing Process in Agile Software Development: An Empirical Study

    Irum Ilays1, Yaser Hafeez1,*, Nabil Almashfi2, Sadia Ali1, Mamoona Humayun3,*, Muhammad Aqib1, Ghadah Alwakid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3761-3784, 2024, DOI:10.32604/cmc.2024.053830 - 12 September 2024

    Abstract Software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification, which affect the testing process. Therefore, it is difficult to identify all faults in software. As requirement changes continuously, it increases the irrelevancy and redundancy during testing. Due to these challenges; fault detection capability decreases and there arises a need to improve the testing process, which is based on changes in requirements specification. In this research, we have developed a model to resolve testing challenges through requirement prioritization and prediction in an agile-based environment. The research objective is to… More >

  • Open Access

    PROCEEDINGS

    Fragile Points Method for Modeling Complex Structural Failure

    Mingjing Li1,*, Leiting Dong1, Satya N. Atluri2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-2, 2023, DOI:10.32604/icces.2023.09689

    Abstract The Fragile Points Method (FPM) is a discontinuous meshless method based on the Galerkin weak form [1]. In the FPM, the problem domain is discretized by spatial points and subdomains, and the displacement trial function of each subdomain is derived based on the points within the support domain. For this reason, the FPM doesn’t suffer from the mesh distortion and is suitable to model complex structural deformations. Furthermore, similar to the discontinuous Galerkin finite element method, the displacement trial functions used in the FPM is piece-wise continuous, and the numerical flux is introduced across each… More >

  • Open Access

    ARTICLE

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    Raheem Ogla1,*, Eman Shakar Mahmood1, Rasha I. Ahmed1, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3075-3096, 2023, DOI:10.32604/cmc.2023.039818 - 08 October 2023

    Abstract The transmission of video content over a network raises various issues relating to copyright authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a significant issue in the video industry, and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media. However, there are still many unresolved challenges. This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos, which can help prove the credibility of video content by detecting any fake… More >

  • Open Access

    ARTICLE

    A Large-Scale Scheduling Method for Multiple Agile Optical Satellites

    Zheng Liu*, Wei Xiong, Minghui Xiong

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1143-1163, 2023, DOI:10.32604/cmes.2023.025452 - 06 February 2023

    Abstract This study investigates the scheduling problem of multiple agile optical satellites with large-scale tasks. This problem is difficult to solve owing to the time-dependent characteristic of agile optical satellites, complex constraints, and considerable solution space. To solve the problem, we propose a scheduling method based on an improved sine and cosine algorithm and a task merging approach. We first establish a scheduling model with task merging constraints and observation action constraints to describe the problem. Then, an improved sine and cosine algorithm is proposed to search for the optimal solution with the maximum profit ratio. More >

  • Open Access

    ARTICLE

    Managing Software Testing Technical Debt Using Evolutionary Algorithms

    Muhammad Abid Jamil*, Mohamed K. Nour

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 735-747, 2022, DOI:10.32604/cmc.2022.028386 - 18 May 2022

    Abstract Technical debt (TD) happens when project teams carry out technical decisions in favor of a short-term goal(s) in their projects, whether deliberately or unknowingly. TD must be properly managed to guarantee that its negative implications do not outweigh its advantages. A lot of research has been conducted to show that TD has evolved into a common problem with considerable financial burden. Test technical debt is the technical debt aspect of testing (or test debt). Test debt is a relatively new concept that has piqued the curiosity of the software industry in recent years. In this… More >

  • Open Access

    ARTICLE

    Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

    Mohammad Alamgeer1, Fahd N. Al-Wesabi2,3,*, Huda G. Iskandar3,4, Imran Khan5, Nadhem Nemri6, Mohammad Medani6, Mohammed Abdullah Al-Hagery7, Ali Mohammed Al-Sharafi3,8

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2497-2513, 2022, DOI:10.32604/cmc.2022.018591 - 07 December 2021

    Abstract Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection of English text. A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach. The researcher uses the first-level order and alphanumeric mechanism of Markov model as… More >

Displaying 1-10 on page 1 of 18. Per Page