Search Results - Encryption and Decryption algorithm for watermarking
-
1
Commutative Encryption and Watermarking in Video Compression
ISSN: 1051-8215, 1558-2205Published: New York, NY IEEE 01.06.2007Published in IEEE transactions on circuits and systems for video technology (01.06.2007)“… To avoid that the watermarking operation affects the decryption operation, a traditional watermarking algorithm is modified…”
Get full text
Journal Article -
2
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking
ISSN: 0165-1684, 1872-7557Published: Elsevier B.V 01.12.2021Published in Signal processing (01.12.2021)“…•Two applications with QDFrKT are investigated, including color image encryption and color image watermarking, so as to evaluate the applicability of the proposed QDFrKT method…”
Get full text
Journal Article -
3
Joint Image Encryption and Screen-Cam Robust Two Watermarking Scheme
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI 20.01.2021Published in Sensors (Basel, Switzerland) (20.01.2021)“… This method combines the advantages of smartphone, encryption and watermarking technologies, thereby achieving watermark extraction with a smartphone, partial decryption and tracking leakage from sneak shots…”
Get full text
Journal Article -
4
A watermarking framework for encrypted medical images via HC chaotic system and deep learning
ISSN: 2045-2322, 2045-2322Published: London Nature Publishing Group UK 14.10.2025Published in Scientific reports (14.10.2025)“… And based on the WHT-DCT transform, it proposes a lossless encryption algorithm…”
Get full text
Journal Article -
5
Vector geographic data commutative encryption and watermarking algorithm based on prediction differences
ISSN: 0957-4174Published: Elsevier Ltd 01.02.2025Published in Expert systems with applications (01.02.2025)“…Commutative encryption and watermarking (CEW) is a seamless integration of encryption and watermarking technologies, overcoming the limitations of single security protection methods that may fail to provide comprehensive data protection…”
Get full text
Journal Article -
6
Watermarking public‐key cryptographic functionalities and implementations: The case of encryption and signatures
ISSN: 1751-8709, 1751-8717Published: John Wiley & Sons, Inc 01.05.2021Published in IET information security (01.05.2021)“…A watermarking scheme for a public‐key cryptographic functionality enables the embedding of a mark in the instance of the secret…”
Get full text
Journal Article -
7
An image decryption technology based on machine learning in an irreversible encryption system
ISSN: 0030-4018Published: Elsevier B.V 15.08.2023Published in Optics communications (15.08.2023)“… information using the phase recovery algorithm and the conventional decryption method, so this is an irreversible coding system…”
Get full text
Journal Article -
8
A multipermutation superposition coding-based fragile watermarking for probabilistic encryption
ISSN: 1380-7501, 1573-7721Published: New York Springer US 01.09.2022Published in Multimedia tools and applications (01.09.2022)“… Without decryption, the proposed algorithm realizes integrity verification and tamper localization in the ciphertext domain and also embeds a large-capacity meaningful watermark, which is rare for fragile watermarking…”
Get full text
Journal Article -
9
Optical cryptosystems
ISBN: 9780750322188, 0750322187, 9780750322218, 0750322217Published: Bristol England (Temple Circus, Temple Way, Bristol BS1 6HG, UK) IOP Publishing 2020“… Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification…”
Get full text
eBook -
10
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking
ISSN: 1556-6013, 1556-6021Published: New York IEEE 2024Published in IEEE transactions on information forensics and security (2024)“… To trace the leak source, a lot of research has been done on screen-shooting resilient watermarking technique, which is capable of extracting the previously embedded watermark from the screen-shot image…”
Get full text
Journal Article -
11
An Approach towards an Efficient Encryption-Decryption of Grayscale and Color Images
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2019Published in Procedia computer science (2019)“… The paper considers a new, authors-developed approach to encryption-decryption of grayscale and color images, which is based on the RSA algorithm…”
Get full text
Journal Article -
12
A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology
ISSN: 2168-2194, 2168-2208, 2168-2208Published: United States IEEE 01.05.2014Published in IEEE journal of biomedical and health informatics (01.05.2014)“… The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption…”
Get full text
Journal Article -
13
Combining double random phase encoding for color image watermarking in quaternion gyrator domain
ISSN: 0030-4018, 1873-0310Published: Elsevier B.V 15.05.2015Published in Optics communications (15.05.2015)“… In this study, a joint encryption/watermarking system with more security based on double random phase encoding (DRPE…”
Get full text
Journal Article -
14
Video fingerprinting and encryption principles for digital rights management
ISSN: 0018-9219, 1558-2256Published: New York IEEE 2004Published in Proceedings of the IEEE (2004)“…This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption…”
Get full text
Journal Article -
15
6D-Chaotic System and 2D Fractional Discrete Cosine Transform Based Encryption of Biometric Templates
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2021Published in IEEE access (2021)“…A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT…”
Get full text
Journal Article -
16
Tchebichef moments and bat optimization algorithm-based information hiding and authentication of medical gray level images
ISSN: 2511-2104, 2511-2112Published: Singapore Springer Nature Singapore 01.01.2024Published in International journal of information technology (Singapore. Online) (01.01.2024)“… This research work focuses on image encryption as well as the watermarking approach that enables the transfer of secret images as well as the hiding of data…”
Get full text
Journal Article -
17
Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2016Published in Procedia computer science (2016)“… In this paper the embedded information is applied as text. Before embedding the text in image, text is encrypted using Advanced Encryption Standard (AES) algorithm…”
Get full text
Journal Article -
18
A Robust Digital Audio Watermarking Algorithm
ISSN: 2831-431XPublished: IEEE 15.12.2023Published in IEEE International Conference on Electronics and Communication Engineering (Online) (15.12.2023)“…Aiming at the problems of insufficient embedding strength and single attack mode, this paper proposes a robust digital audio watermarking algorithm for binary images…”
Get full text
Conference Proceeding -
19
Joint Watermarking-Encryption-JPEG-LS for Medical Image Reliability Control in Encrypted and Compressed Domains
ISSN: 1556-6013, 1556-6021Published: New York IEEE 2020Published in IEEE transactions on information forensics and security (2020)“…In this paper, we propose the first joint watermarking-encryption-compression scheme for the purpose of protecting of medical images…”
Get full text
Journal Article -
20
Robust and blind watermarking using Arnold 4D cat map in discrete wavelet
ISSN: 2511-2104, 2511-2112Published: Singapore Springer Singapore 01.06.2020Published in International journal of information technology (Singapore. Online) (01.06.2020)“…Though watermarking got attention in the past decade, its robustness and security remain as a challenge to the researchers…”
Get full text
Journal Article

