Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (84)
  • Open Access

    ARTICLE

    Semi-Fragile Image Watermarking Using Quantization-Based DCT for Tamper Localization

    Agit Amrullah, Ferda Ernawan*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069229 - 09 December 2025

    Abstract This paper proposes a tamper detection technique for semi-fragile watermarking using Quantization-based Discrete Cosine Transform (DCT) for tamper localization. In this study, the proposed embedding strategy is investigated by experimental tests over the diagonal order of the DCT coefficients. The cover image is divided into non-overlapping blocks of size 8 × 8 pixels. The DCT is applied to each block, and the coefficients are arranged using a zig-zag pattern within the block. In this study, the low-frequency coefficients are selected to examine the impact of the imperceptibility score and tamper detection accuracy. High accuracy of… More >

  • Open Access

    ARTICLE

    Multi-Feature Fragile Image Watermarking Algorithm for Tampering Blind-Detection and Content Self-Recovery

    Qiuling Wu1,*, Hao Li1, Mingjian Li1, Ming Wang2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-20, 2026, DOI:10.32604/cmc.2025.068220 - 10 November 2025

    Abstract Digital watermarking technology plays an important role in detecting malicious tampering and protecting image copyright. However, in practical applications, this technology faces various problems such as severe image distortion, inaccurate localization of the tampered regions, and difficulty in recovering content. Given these shortcomings, a fragile image watermarking algorithm for tampering blind-detection and content self-recovery is proposed. The multi-feature watermarking authentication code (AC) is constructed using texture feature of local binary patterns (LBP), direct coefficient of discrete cosine transform (DCT) and contrast feature of gray level co-occurrence matrix (GLCM) for detecting the tampered region, and the… More >

  • Open Access

    ARTICLE

    Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics

    Ahmed El Maloufy, Mohamed Amine Tahiri, Ahmed Bencherqui, Hicham Karmouni, Mhamed Sayyouri*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5789-5822, 2025, DOI:10.32604/cmc.2025.068885 - 23 October 2025

    Abstract In the current digital context, safeguarding copyright is a major issue, particularly for architectural drawings produced by students. These works are frequently the result of innovative academic thinking combining creativity and technical precision. They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format. This research suggests, for the first time, an innovative approach to copyright protection by embedding a double digital watermark to address this challenge. The solution relies on a synergistic fusion of several sophisticated methods: Krawtchouk Optimized Octonion Moments (OKOM), Quaternion Singular Value Decomposition (QSVD), and Discrete Waveform… More >

  • Open Access

    ARTICLE

    Modified Watermarking Scheme Using Informed Embedding and Fuzzy c-Means–Based Informed Coding

    Jyun-Jie Wang1, Yin-Chen Lin1, Chi-Chun Chen2,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5595-5624, 2025, DOI:10.32604/cmc.2025.066160 - 23 October 2025

    Abstract Digital watermarking must balance imperceptibility, robustness, complexity, and security. To address the challenge of computational efficiency in trellis-based informed embedding, we propose a modified watermarking framework that integrates fuzzy c-means (FCM) clustering into the generation off block codewords for labeling trellis arcs. The system incorporates a parallel trellis structure, controllable embedding parameters, and a novel informed embedding algorithm with reduced complexity. Two types of embedding schemes—memoryless and memory-based—are designed to flexibly trade-off between imperceptibility and robustness. Experimental results demonstrate that the proposed method outperforms existing approaches in bit error rate (BER) and computational complexity under More >

  • Open Access

    ARTICLE

    Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence

    Fatima Abu Siryeh*, Hussein Alrammahi, Abdullahi Abdu İbrahim

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5021-5046, 2025, DOI:10.32604/cmc.2025.065206 - 30 July 2025

    Abstract Biometric template protection is essential for finger-based authentication systems, as template tampering and adversarial attacks threaten the security. This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication. The system was tested against NIST SD4 and Anguli fingerprint datasets, wherein 10,000 watermarked fingerprints were employed for training. The designed approach recorded a tamper detection rate of 98.3%, performing 3–6% better than current DCT, SVD, and DWT-based watermarking approaches. The false positive rate (≤1.2%) and false negative rate (≤1.5%) were much lower compared to previous… More >

  • Open Access

    ARTICLE

    Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform

    Maazen Alsabaan1, Zaid Bin Faheem2, Yuanyuan Zhu2, Jehad Ali3,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 491-512, 2025, DOI:10.32604/cmc.2025.064971 - 09 June 2025

    Abstract Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms. Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content. Image watermarking can also be used to verify the authenticity of digital media, such as images or videos, by ascertaining the watermark information. In this paper, a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform (DWT), chaotic map, and Laplacian operator. The DWT can be used to decompose… More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Based on DWT and RDWT Combined with Möbius Transformations

    Atheer Alrammahi1,2, Hedieh Sajedi1,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 887-918, 2025, DOI:10.32604/cmc.2025.063866 - 09 June 2025

    Abstract Ensuring digital media security through robust image watermarking is essential to prevent unauthorized distribution, tampering, and copyright infringement. This study introduces a novel hybrid watermarking framework that integrates Discrete Wavelet Transform (DWT), Redundant Discrete Wavelet Transform (RDWT), and Möbius Transformations (MT), with optimization of transformation parameters achieved via a Genetic Algorithm (GA). By combining frequency and spatial domain techniques, the proposed method significantly enhances both the imperceptibility and robustness of watermark embedding. The approach leverages DWT and RDWT for multi-resolution decomposition, enabling watermark insertion in frequency subbands that balance visibility and resistance to attacks. RDWT,… More >

  • Open Access

    ARTICLE

    Robust Reversible Watermarking Technique Based on Improved Polar Harmonic Transform

    Muath AlShaikh*

    Computer Systems Science and Engineering, Vol.49, pp. 435-453, 2025, DOI:10.32604/csse.2025.062432 - 13 May 2025

    Abstract Many existing watermarking approaches aim to provide a Robust Reversible Data Hiding (RRDH) method. However, most of these approaches degrade under geometric and non-geometric attacks. This paper presents a novel RRDH approach using Polar Harmonic Fourier Moments (PHFMs) and linear interpolation. The primary objective is to enhance the robustness of the embedded watermark and improve the imperceptibility of the watermarked image. The proposed method leverages the high-fidelity and anti-geometric transformation properties of PHFMs. The image is transformed into the frequency domain of RRDH, after which compensation data is embedded using a two-dimensional RDH scheme. Linear… More >

  • Open Access

    ARTICLE

    Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking

    Shu-Chuan Chu1,2, Libin Fu2, Jeng-Shyang Pan2,3, Xingsi Xue4, Min Liu5,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3135-3163, 2025, DOI:10.32604/cmc.2025.062469 - 16 April 2025

    Abstract Evolutionary algorithms have been extensively utilized in practical applications. However, manually designed population updating formulas are inherently prone to the subjective influence of the designer. Genetic programming (GP), characterized by its tree-based solution structure, is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems. This paper introduces a GP-based framework (GP-EAs) for the autonomous generation of update formulas, aiming to reduce human intervention. Partial modifications to tree-based GP have been instigated, encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.… More >

  • Open Access

    ARTICLE

    Joint Watermarking and Encryption for Social Image Sharing

    Conghuan Ye1,*, Shenglong Tan1, Shi Li1, Jun Wang1, Qiankun Zuo1, Bing Xiong2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2927-2946, 2025, DOI:10.32604/cmc.2025.062051 - 16 April 2025

    Abstract With the fast development of multimedia social platforms, content dissemination on social media platforms is becoming more popular. Social image sharing can also raise privacy concerns. Image encryption can protect social images. However, most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain. In this work, the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption. First, the fingerprint code with a hierarchical community structure is designed based on social network analysis. Then, discrete wavelet transform (DWT) from block discrete cosine transform (DCT) directly… More >

Displaying 1-10 on page 1 of 84. Per Page