Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine

    Arslan Akram1,2, Imran Khan1, Javed Rashid2,3, Mubbashar Saddique4,*, Muhammad Idrees4, Yazeed Yasin Ghadi5, Abdulmohsen Algarni6

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1311-1328, 2024, DOI:10.32604/cmc.2023.040512 - 30 January 2024

    Abstract Algorithms for steganography are methods of hiding data transfers in media files. Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information, and these methods have made it feasible to handle a wide range of problems associated with image analysis. Images with little information or low payload are used by information embedding methods, but the goal of all contemporary research is to employ high-payload images for classification. To address the need for both low- and high-payload images, this work provides a machine-learning approach to steganography image classification… More >

  • Open Access

    ARTICLE

    Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi

    Doaa Sami Khafaga1, Sarah M. Alhammad1,*, Amal Magdi2, Osama ElKomy2, Nabil A. Lashin2, Khalid M. Hosny2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1967-1986, 2023, DOI:10.32604/csse.2023.040345 - 28 July 2023

    Abstract Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access. Due to the wide use of the Internet nowadays, the need to ensure data integrity and authentication increases. Many techniques, such as watermarking and encryption, are used for securing images transmitted via the Internet. The majority of watermarking systems are PC-based, but they are not very portable. Hardware-based watermarking methods need to be developed to accommodate real-time applications and provide portability. This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the… More >

  • Open Access

    ARTICLE

    Simulated Annealing with Deep Learning Based Tongue Image Analysis for Heart Disease Diagnosis

    S. Sivasubramaniam*, S. P. Balamurugan

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 111-126, 2023, DOI:10.32604/iasc.2023.035199 - 29 April 2023

    Abstract Tongue image analysis is an efficient and non-invasive technique to determine the internal organ condition of a patient in oriental medicine, for example, traditional Chinese medicine (TCM), Japanese traditional herbal medicine, and traditional Korean medicine (TKM). The diagnosis procedure is mainly based on the expert's knowledge depending upon the visual inspection comprising color, substance, coating, form, and motion of the tongue. But conventional tongue diagnosis has limitations since the procedure is inconsistent and subjective. Therefore, computer-aided tongue analyses have a greater potential to present objective and more consistent health assessments. This manuscript introduces a novel… More >

  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655 - 03 April 2023

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed… More >

  • Open Access

    ARTICLE

    Detecting Double JPEG Compressed Color Images via an Improved Approach

    Xiaojie Zhao1, Xiankui Meng1, Ruyong Ren2, Shaozhang Niu2,*, Zhenguang Gao3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1765-1781, 2023, DOI:10.32604/cmc.2023.029552 - 06 February 2023

    Abstract Detecting double Joint Photographic Experts Group (JPEG) compression for color images is vital in the field of image forensics. In previous researches, there have been various approaches to detecting double JPEG compression with different quantization matrices. However, the detection of double JPEG color images with the same quantization matrix is still a challenging task. An effective detection approach to extract features is proposed in this paper by combining traditional analysis with Convolutional Neural Networks (CNN). On the one hand, the number of nonzero pixels and the sum of pixel values of color space conversion error… More >

  • Open Access

    ARTICLE

    An Efficient Text Recognition System from Complex Color Image for Helping the Visually Impaired Persons

    Ahmed Ben Atitallah1,*, Mohamed Amin Ben Atitallah2,3, Yahia Said4,5, Mohammed Albekairi1, Anis Boudabous6, Turki M. Alanazi1, Khaled Kaaniche1, Mohamed Atri7

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 701-717, 2023, DOI:10.32604/csse.2023.035871 - 20 January 2023

    Abstract The challenge faced by the visually impaired persons in their day-to-day lives is to interpret text from documents. In this context, to help these people, the objective of this work is to develop an efficient text recognition system that allows the isolation, the extraction, and the recognition of text in the case of documents having a textured background, a degraded aspect of colors, and of poor quality, and to synthesize it into speech. This system basically consists of three algorithms: a text localization and detection algorithm based on mathematical morphology method (MMM); a text extraction… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding with Contrast Enhancement Using Bi-histogram Shifting and Image Adjustment for Color Images

    Goma Tshivetta Christian Fersein Jorvialom1,2, Lord Amoah1,2,*

    Journal of Quantum Computing, Vol.4, No.3, pp. 183-197, 2022, DOI:10.32604/jqc.2022.039913 - 03 July 2023

    Abstract Prior versions of reversible data hiding with contrast enhancement (RDHCE) algorithms strongly focused on enhancing the contrast of grayscale images. However, RDHCE has recently witnessed a rise in contrast enhancement algorithms concentrating on color images. This paper implies a method for color images that uses the RGB (red, green, and blue) color model and is based on bi-histogram shifting and image adjustment. Bi-histogram shifting is used to embed data and image adjustment to achieve contrast enhancement by adjusting the images resulting from each channel of the color images before combining them to generate the final… More >

  • Open Access

    ARTICLE

    Contourlet and Gould Transforms for Hybrid Image Watermarking in RGB Color Images

    Reena Thomas1,*, M. Sucharitha2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 879-889, 2022, DOI:10.32604/iasc.2022.024070 - 08 February 2022

    Abstract The major intention of this work is to introduce a novel hybrid image watermarking technique for RGB color images. This hybrid watermarking algorithm uses two transforms such as Contourlet and Gould transform. The Contourlet transform is used as first stage while the Gould transform is used as second stage. In the watermark embedding phase, the R, G and B channels are transformed using Contourlet transform. The bandpass directional sub band coefficients of Contourlet transformed image are then divided into sub-blocks. The sub-blocks are then transformed using Gould transform and the watermark information is embedded on More >

  • Open Access

    ARTICLE

    Efficient Forgery Detection Approaches for Digital Color Images

    Amira Baumy1, Abeer D. Algarni2,*, Mahmoud Abdalla3, Walid El-Shafai4,5, Fathi E. Abd El-Samie3,4, Naglaa F. Soliman2,3

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3257-3276, 2022, DOI:10.32604/cmc.2022.021047 - 07 December 2021

    Abstract This paper is concerned with a vital topic in image processing: color image forgery detection. The development of computing capabilities has led to a breakthrough in hacking and forgery attacks on signal, image, and data communicated over networks. Hence, there is an urgent need for developing efficient image forgery detection algorithms. Two main types of forgery are considered in this paper: splicing and copy-move. Splicing is performed by inserting a part of an image into another image. On the other hand, copy-move forgery is performed by copying a part of the image into another position… More >

  • Open Access

    ARTICLE

    A Bi-Histogram Shifting Contrast Enhancement for Color Images

    Lord Amoah1,2,*, Ampofo Twumasi Kwabena3

    Journal of Quantum Computing, Vol.3, No.2, pp. 65-77, 2021, DOI:10.32604/jqc.2021.020734 - 22 June 2021

    Abstract Recent contrast enhancement (CE) methods, with a few exceptions, predominantly focus on enhancing gray-scale images. This paper proposes a bihistogram shifting contrast enhancement for color images based on the RGB (red, green, and blue) color model. The proposed method selects the two highest bins and two lowest bins from the image histogram, performs an equalized number of bidirectional histogram shifting repetitions on each RGB channel while embedding secret data into marked images. The proposed method simultaneously performs both right histogram shifting (RHS) and left histogram shifting (LHS) in each histogram shifting repetition to embed and… More >

Displaying 1-10 on page 1 of 12. Per Page