Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Digital Text Document Watermarking Based Tampering Attack Detection via Internet

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 759-771, 2024, DOI:10.32604/csse.2023.037305 - 20 May 2024

    Abstract Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem. Tampering detection, Content authentication, and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies. The authors’ difficulties were tampering detection, authentication, and integrity verification of the digital contents. This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection (ADMDTW-TAD) via the Internet. The DM concept is exploited in the presented… More >

  • Open Access

    ARTICLE

    High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security

    Wajdi Elhamzi1,2,*, Malika Jallouli3, Yassine Bouteraa1,4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4329-4347, 2022, DOI:10.32604/cmc.2022.030954 - 16 June 2022

    Abstract Since 3D mesh security has become intellectual property, 3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases. The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain, allowing us to greatly expand the size of the watermark. After that, our method does two rounds of insertion, each applying a different type of Clifford-wavelet transform. Before being placed into the Clifford-multiwavelet coefficients, the watermark, which is a mixture of the mesh description, source… More >

  • Open Access

    ARTICLE

    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684 - 14 January 2022

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark… More >

  • Open Access

    ARTICLE

    Local Features-Based Watermarking for Image Security in Social Media

    Shady Y. El-mashad1, Amani M. Yassen1, Abdulwahab K. Alsammak1, Basem M. Elhalawany2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3857-3870, 2021, DOI:10.32604/cmc.2021.018660 - 24 August 2021

    Abstract The last decade shows an explosion of using social media, which raises several challenges related to the security of personal files including images. These challenges include modifying, illegal copying, identity fraud, copyright protection and ownership of images. Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes. In this paper, we propose a hybrid digital watermarking and image processing approach to improve the image security level. Specifically, variants of the widely used Least-Significant Bit (LSB) watermarking technique are merged with a blob detection algorithm to embed More >

  • Open Access

    ARTICLE

    A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19

    Xiaorui Zhang1, 2, *, Wenfang Zhang1, Wei Sun2, Tong Xu1, Sunil Kumar Jha3

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1435-1452, 2020, DOI:10.32604/cmc.2020.011359 - 30 June 2020

    Abstract In the current dire situation of the corona virus COVID-19, remote consultations were proposed to avoid cross-infection and regional differences in medical resources. However, the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry. To ensure the integrity and security of medical images, this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest (ROI) and integer wavelet transform (IWT). First, the medical image is divided into two different parts, regions of interest and non-interest… More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the More >

  • Open Access

    ARTICLE

    Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing

    Zhen Yang1,2, Yongfeng Huang1,2,*, Xing Li1,2, Wenyu Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 1-17, 2018, DOI:10.3970/cmc.2018.03697

    Abstract To cope with privacy leakage caused by multimedia outsourcing and sharing, data provenance is used to analyze leaked multimedia and provide reactive accountability. Existing schemes of multimedia provenance are based on watermarking protocols. In an outsourcing scenario, existing schemes face two severe challenges: 1) when data leakage occurs, there exists a probability that data provenance results can be repudiated, in which case data provenance tracking fails; and 2) when outsourced data are shared, data encryption transfer causes key management burden outside the schemes, and privacy leakage threatens users. In this paper, we propose a novel More >

Displaying 1-10 on page 1 of 7. Per Page