Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (53)

Search Parameters:
Keywords = invisible watermark

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
25 pages, 7476 KiB  
Article
Image Encryption with Dual Watermark Based on Chaotic Map
by Ran Chu, Jun Mou and Yuanhui Cui
Cryptography 2025, 9(3), 49; https://doi.org/10.3390/cryptography9030049 - 1 Jul 2025
Viewed by 594
Abstract
A dual watermark and DNA image encryption based on a chaotic map is proposed. Firstly, a new discrete chaotic map is proposed, and the dynamic characteristics are analyzed. Then, the hash value changes initial conditions, and the pseudo-random sequence is generated. The encrypted [...] Read more.
A dual watermark and DNA image encryption based on a chaotic map is proposed. Firstly, a new discrete chaotic map is proposed, and the dynamic characteristics are analyzed. Then, the hash value changes initial conditions, and the pseudo-random sequence is generated. The encrypted copyright image is fused with the feature value of the original image and then encrypted again to form zero-watermarking, which is registered with the copyright certification authority. The zero-watermarking is taken as a robust watermark and embedded into the original image based on a chaotic sequence to ensure its invisibility. Finally, a cross-mutation DNA encryption is proposed. The experimental results verify the performance of encryption and dual watermark copyright authentication, and the ability to resist attacks. Full article
Show Figures

Figure 1

22 pages, 2541 KiB  
Article
Channel Interaction Mamba-Guided Generative Adversarial Network for Depth-Image-Based Rendering 3D Image Watermarking
by Qingmo Chen, Zhongxing Sun, Rui Bai and Chongchong Jin
Electronics 2025, 14(10), 2050; https://doi.org/10.3390/electronics14102050 - 18 May 2025
Viewed by 472
Abstract
In the field of 3D technology, depth-image-based rendering (DIBR) has been widely adopted due to its inherent advantages including low data volume and strong compatibility. However, during network transmission of DIBR 3D images, both center and virtual views are susceptible to unauthorized copying [...] Read more.
In the field of 3D technology, depth-image-based rendering (DIBR) has been widely adopted due to its inherent advantages including low data volume and strong compatibility. However, during network transmission of DIBR 3D images, both center and virtual views are susceptible to unauthorized copying and distribution. To protect the copyright of these images, this paper proposes a channel interaction mamba-guided generative adversarial network (CIMGAN) for DIBR 3D image watermarking. To capture cross-modal feature dependencies, a channel interaction mamba (CIM) is designed. This module enables lightweight cross-modal channel interaction through a channel exchange mechanism and leverages mamba for global modeling of RGB and depth information. In addition, a feature fusion module (FFM) is devised to extract complementary information from cross-modal features and eliminate redundant information, ultimately generating high-quality 3D image features. These features are used to generate an attention map, enhancing watermark invisibility and identifying robust embedding regions. Compared to the current state-of-the-art (SOTA) 3D image watermarking methods, the proposed watermark model shows superior performance in terms of robustness and invisibility while maintaining computational efficiency. Full article
Show Figures

Figure 1

23 pages, 6045 KiB  
Article
Deep Watermarking Based on Swin Transformer for Deep Model Protection
by Cheng-Hin Un and Ka-Cheng Choi
Appl. Sci. 2025, 15(10), 5250; https://doi.org/10.3390/app15105250 - 8 May 2025
Viewed by 642
Abstract
This study improves existing protection strategies for image processing models by embedding invisible watermarks into model outputs to verify the sources of images. Most current methods rely on CNN-based architectures, which are limited by their local perception capabilities and struggle to effectively capture [...] Read more.
This study improves existing protection strategies for image processing models by embedding invisible watermarks into model outputs to verify the sources of images. Most current methods rely on CNN-based architectures, which are limited by their local perception capabilities and struggle to effectively capture global information. To address this, we introduce the Swin-UNet, originally designed for medical image segmentation tasks, into the watermark embedding process. The Swin Transformer’s ability to capture global information enhances the visual quality of the embedded image compared to CNN-based approaches. To defend against surrogate attacks, data augmentation techniques are incorporated into the training process, enhancing the watermark extractor’s robustness specifically against surrogate attacks. Experimental results show that the proposed watermarking approach reduces the impact of watermark embedding on visual quality. On a deraining task with color images, the average PSNR reaches 45.85 dB, while on a denoising task with grayscale images, the average PSNR reaches 56.60 dB. Additionally, watermarks extracted from surrogate attacks closely match those from the original framework, with an accuracy of 99% to 100%. These results confirm the Swin Transformer’s effectiveness in preserving visual quality. Full article
Show Figures

Figure 1

23 pages, 5484 KiB  
Article
Template Watermarking Algorithm for Remote Sensing Images Based on Semantic Segmentation and Ellipse-Fitting
by Xuanyuan Cao, Wei Zhang, Qifei Zhou, Changqing Zhu and Na Ren
Remote Sens. 2025, 17(3), 502; https://doi.org/10.3390/rs17030502 - 31 Jan 2025
Viewed by 966
Abstract
This study presents a ring template watermarking method utilizing semantic segmentation and elliptical fitting to address the inadequate resilience of digital watermarking techniques for remote sensing images against geometric attacks and affine transformations. The approach employs a convolutional neural network to determine the [...] Read more.
This study presents a ring template watermarking method utilizing semantic segmentation and elliptical fitting to address the inadequate resilience of digital watermarking techniques for remote sensing images against geometric attacks and affine transformations. The approach employs a convolutional neural network to determine the coverage position of the annular template watermark automatically. Subsequently, it applies the least squares approach to align with the relevant elliptic curve of the annular watermark, facilitating the restoration of the watermark template post-deformation due to an attack. Ultimately, it acquires the watermark information by analyzing the binarized image according to the coordinates. The experimental results indicate that, despite various geometric and affine modification attacks, the NC mean value of watermark extraction exceeds 0.83, and the PSNR value surpasses 35, thereby ensuring substantial invisibility and enhanced robustness. In addition, the methods presented in this paper provide useful references for imaging data in other fields. Full article
Show Figures

Figure 1

23 pages, 3923 KiB  
Article
A Robust Semi-Blind Watermarking Technology for Resisting JPEG Compression Based on Deep Convolutional Generative Adversarial Networks
by Chin-Feng Lee, Zih-Cyuan Chao, Jau-Ji Shen and Anis Ur Rehman
Symmetry 2025, 17(1), 98; https://doi.org/10.3390/sym17010098 - 10 Jan 2025
Cited by 1 | Viewed by 1201
Abstract
In recent years, the internet has developed rapidly. With the popularity of social media, uploading and backing up digital images has become the norm. A huge number of digital images are circulating on the internet daily, and issues related to information security follow. [...] Read more.
In recent years, the internet has developed rapidly. With the popularity of social media, uploading and backing up digital images has become the norm. A huge number of digital images are circulating on the internet daily, and issues related to information security follow. To protect intellectual property rights, digital watermarking is an indispensable technology. However, the common lossy compression technology in the network transmission process is a big problem for watermarking. This paper describes an innovative semi-blind watermarking method with the use of deep convolutional generative adversarial networks (DCGANs) for hiding and extracting watermarks from JPEG-compressed images. The proposed method achieves an average peak signal-to-noise ratio (PSNR) of 49.99 dB, a structural similarity index (SSIM) of 0.95, and a bit error rate (BER) of 0.008 across varying JPEG quality factors. The process is based on an embedder, decoder, generator, and discriminator. It allows watermarking, decoding, or reconstruction to be symmetric such that there is less distortion and durability is improved. It constructs a specific generator for each image and watermark that is supposed to be protected. Experimental results show that, with the variety of JPEG quality factors, the restored watermark achieves a remarkably low corrupted rate, outstripping recent deep learning-based watermarking methods. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

23 pages, 4649 KiB  
Article
A Decentralized Digital Watermarking Framework for Secure and Auditable Video Data in Smart Vehicular Networks
by Xinyun Liu, Ronghua Xu and Yu Chen
Future Internet 2024, 16(11), 390; https://doi.org/10.3390/fi16110390 - 24 Oct 2024
Cited by 5 | Viewed by 1757
Abstract
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is [...] Read more.
Thanks to the rapid advancements in Connected and Automated Vehicles (CAVs) and vehicular communication technologies, the concept of the Internet of Vehicles (IoVs) combined with Artificial Intelligence (AI) and big data promotes the vision of an Intelligent Transportation System (ITS). An ITS is critical in enhancing road safety, traffic efficiency, and the overall driving experience by enabling a comprehensive data exchange platform. However, the open and dynamic nature of IoV networks brings significant performance and security challenges to IoV data acquisition, storage, and usage. To comprehensively tackle these challenges, this paper proposes a Decentralized Digital Watermarking framework for smart Vehicular networks (D2WaVe). D2WaVe consists of two core components: FIAE-GAN, a novel feature-integrated and attention-enhanced robust image watermarking model based on a Generative Adversarial Network (GAN), and BloVA, a Blockchain-based Video frames Authentication scheme. By leveraging an encoder–noise–decoder framework, trained FIAE-GAN watermarking models can achieve the invisibility and robustness of watermarks that can be embedded in video frames to verify the authenticity of video data. BloVA ensures the integrity and auditability of IoV data in the storing and sharing stages. Experimental results based on a proof-of-concept prototype implementation validate the feasibility and effectiveness of our D2WaVe scheme for securing and auditing video data exchange in smart vehicular networks. Full article
Show Figures

Figure 1

24 pages, 6069 KiB  
Article
Commutative Encryption and Reversible Watermarking Algorithm for Vector Maps Based on Virtual Coordinates
by Qianyi Dai, Baiyan Wu, Fanshuo Liu, Zixuan Bu and Haodong Zhang
ISPRS Int. J. Geo-Inf. 2024, 13(9), 338; https://doi.org/10.3390/ijgi13090338 - 22 Sep 2024
Cited by 3 | Viewed by 1330
Abstract
The combination of encryption and digital watermarking technologies is an increasingly popular approach to achieve full lifecycle data protection. Recently, reversible data hiding in the encrypted domain (RDHED) has greatly aroused the interest of many scholars. However, the fixed order of first encryption [...] Read more.
The combination of encryption and digital watermarking technologies is an increasingly popular approach to achieve full lifecycle data protection. Recently, reversible data hiding in the encrypted domain (RDHED) has greatly aroused the interest of many scholars. However, the fixed order of first encryption and then watermarking makes these algorithms unsuitable for many applications. Commutative encryption and watermarking (CEW) technology realizes the flexible combination of encryption and watermarking, and suits more applications. However, most existing CEW schemes for vector maps are not reversible and are unsuitable for high-precision maps. To solve this problem, here, we propose a commutative encryption and reversible watermarking (CERW) algorithm for vector maps based on virtual coordinates that are uniformly distributed on the number axis. The CERW algorithm consists of a virtual interval step-based encryption scheme and a coordinate difference-based reversible watermarking scheme. In the encryption scheme, the map coordinates are moved randomly by multiples of virtual interval steps defined as the distance between two adjacent virtual coordinates. In the reversible watermarking scheme, the difference expansion (DE) technique is used to embed the watermark bit into the coordinate difference, computed based on the relative position of a map coordinate in a virtual interval. As the relative position of a map coordinate in a virtual interval remains unchanged during the coordinate scrambling encryption process, the watermarking and encryption operations do not interfere with each other, and commutativity between encryption and watermarking is achieved. The results show that the proposed method has high security, high capacity, and good invisibility. In addition, the algorithm applies not only to polyline and polygon vector data, but also to sparsely distributed point data, which traditional DE watermarking algorithms often fail to watermark. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

24 pages, 44119 KiB  
Article
Chebyshev Chaotic Mapping and DWT-SVD-Based Dual Watermarking Scheme for Copyright and Integrity Authentication of Remote Sensing Images
by Jie Zhang, Jinglong Du, Xu Xi and Zihao Yang
Symmetry 2024, 16(8), 969; https://doi.org/10.3390/sym16080969 - 30 Jul 2024
Cited by 4 | Viewed by 1756
Abstract
Symmetries and symmetry-breaking play significant roles in data security. While remote sensing images, being extremely sensitive geospatial data, require protection against tampering or destruction, as well as assurance of the reliability of the data source during application. In view of the increasing complexity [...] Read more.
Symmetries and symmetry-breaking play significant roles in data security. While remote sensing images, being extremely sensitive geospatial data, require protection against tampering or destruction, as well as assurance of the reliability of the data source during application. In view of the increasing complexity of data security of remote sensing images, a single watermark algorithm is no longer adequate to meet the demand of sophisticated applications. Therefore, this study proposes a dual watermarking algorithm that considers both integrity authentication and copyright protection of remote sensing images. The algorithm utilizes Discrete Wavelet Transform (DWT) to decompose remote sensing images, then constructs integrity watermark information by applying Chebyshev mapping to the mean of horizontal and vertical components. This semi-fragile watermark information is embedded into the high-frequency region of DWT using Quantization Index Modulation (QIM). On the other hand, the robust watermarking uses entropy to determine the embedding position within the DWT domain. It combines the stability of Singular Value Decomposition (SVD) and embeds the watermark according to the relationship between the singular values of horizontal, vertical, and high-frequency components. The experiment showed that the proposed watermarking successfully maintains a high level of invisibility even if embedded with dual watermarks. The semi-fragile watermark can accurately identify tampered regions in remote sensing images under conventional image processing. Moreover, the robust watermark exhibits excellent resistance to various attacks such as noise, filtering, compression, panning, rotating, and scaling. Full article
(This article belongs to the Special Issue Symmetries and Symmetry-Breaking in Data Security)
Show Figures

Figure 1

16 pages, 10786 KiB  
Article
Moving beyond the Content: 3D Scanning and Post-Processing Analysis of the Cuneiform Tablets of the Turin Collection
by Filippo Diara, Francesco Giuseppe Barsacchi and Stefano de Martino
Appl. Sci. 2024, 14(11), 4492; https://doi.org/10.3390/app14114492 - 24 May 2024
Viewed by 1827
Abstract
This work and manuscript focus on how 3D scanning methodologies and post-processing analyses may help us to gain a deeper investigation of cuneiform tablets beyond the written content. The dataset proposed herein is a key part of the archaeological collection preserved in the [...] Read more.
This work and manuscript focus on how 3D scanning methodologies and post-processing analyses may help us to gain a deeper investigation of cuneiform tablets beyond the written content. The dataset proposed herein is a key part of the archaeological collection preserved in the Musei Reali of Turin in Italy; these archaeological artefacts enclose further important semantic information extractable through detailed 3D documentation and 3D model filtering. In fact, this scanning process is a fundamental tool for better reading of sealing impressions beneath the cuneiform text, as well as for understanding micrometric evidence of the fingerprints of scribes. Most of the seal impressions were made before the writing (like a watermark), and thus, they are not detectable to the naked eye due to cuneiform signs above them as well as the state of preservation. In this regard, 3D scanning and post-processing analysis could help in the analysis of these nearly invisible features impressed on tablets. For this reason, this work is also based on how 3D analyses may support the identification of the unperceived and almost invisible features concealed in clay tablets. Analysis of fingerprints and the depths of the signs can tell us about the worker’s strategies and the people beyond the artefacts. Three-dimensional models generated inside the Artec 3D ecosystem via Space Spider scanner and Artec Studio software were further investigated by applying specific filters and shaders. Digital light manipulation can reveal, through the dynamic displacement of light and shadows, particular details that can be deeply analysed with specific post-processing operations: for example, the MSII (multi-scale integral invariant) filter is a powerful tool exploited for revealing hidden and unperceived features such as fingerprints and sealing impressions (stratigraphically below cuneiform signs). Finally, the collected data will be handled twofold: in an open-access repository and through a common data environment (CDE) to aid in the data exchange process for project collaborators and common users. Full article
Show Figures

Figure 1

21 pages, 398 KiB  
Article
A Unique Identification-Oriented Black-Box Watermarking Scheme for Deep Classification Neural Networks
by Mouke Mo, Chuntao Wang and Shan Bian
Symmetry 2024, 16(3), 299; https://doi.org/10.3390/sym16030299 - 4 Mar 2024
Cited by 3 | Viewed by 2029
Abstract
Given the substantial value and considerable training costs associated with deep neural network models, the field of deep neural network model watermarking has come to the forefront. While black-box model watermarking has made commendable strides, the current methodology for constructing poisoned images in [...] Read more.
Given the substantial value and considerable training costs associated with deep neural network models, the field of deep neural network model watermarking has come to the forefront. While black-box model watermarking has made commendable strides, the current methodology for constructing poisoned images in the existing literature is simplistic and susceptible to forgery. Notably, there is a scarcity of black-box model watermarking techniques capable of discerning a unique user in a multi-user model distribution setting. For this reason, this paper proposes a novel black-box model watermarking method for unique identity identification, which is denoted as the ID watermarking of neural networks (IDwNet). Specifically, to enhance the distinguishability of deep neural network models in multi-user scenarios and mitigate the likelihood of poisoned image counterfeiting, this study develops a discrete cosine transform (DCT) and singular value decomposition (SVD)-based symmetrical embedding method to form the poisoned image. As this ID embedding method leads to indistinguishable deep features, the study constructs a poisoned adversary training strategy by simultaneously inputting clean images, poisoned images with the correct ID, and poisoned adversary images with incorrect IDs to train a deep neural network. Extensive simulation experiments show that the proposed scheme achieves excellent invisibility for the concealed ID, surpassing remarkably the state-of-the-art. In addition, the proposed scheme obtains a validation success rate exceeding 99% for the poisoned images at the cost of a marginal classification accuracy reduction of less than 0.5%. Moreover, even though there is only a 1-bit discrepancy between IDs, the proposed scheme still results in an accurate validation of user copyright. These results indicate that the proposed scheme is promising. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

17 pages, 11831 KiB  
Article
High-Frequency Artifacts-Resistant Image Watermarking Applicable to Image Processing Models
by Li Zhang, Xinpeng Zhang and Hanzhou Wu
Appl. Sci. 2024, 14(4), 1494; https://doi.org/10.3390/app14041494 - 12 Feb 2024
Cited by 1 | Viewed by 2189
Abstract
With the extensive adoption of generative models across various domains, the protection of copyright for these models has become increasingly vital. Some researchers suggest embedding watermarks in the images generated by these models as a means of preserving IP rights. In this paper, [...] Read more.
With the extensive adoption of generative models across various domains, the protection of copyright for these models has become increasingly vital. Some researchers suggest embedding watermarks in the images generated by these models as a means of preserving IP rights. In this paper, we find that existing generative model watermarking introduces high-frequency artifacts in the high-frequency spectrum of the marked images, thereby compromising the imperceptibility and security of the generative model watermarking system. Given this revelation, we propose an innovative image watermarking technology that takes into account frequency-domain imperceptibility. Our approach abandons the conventional convolutional neural network (CNN) structure typically used as the watermarking embedding network in popular watermarking techniques. This helps the image watermarking system to avoid the inherent high-frequency artifacts commonly produced by CNNs. In addition, we design a frequency perturbation generation network to generate low-frequency perturbations. These perturbations are subsequently added as watermarks to the low-frequency components of the carrier image, thus minimizing the impact of the watermark embedding process on the high-frequency properties of the image. The results show that our proposed watermarking framework can effectively embed low-frequency perturbation watermarks into images and effectively suppress high-frequency artifacts in images, thus significantly improving the frequency-domain imperceptibility and security of the image watermarking system. The introduced approach enhances the average invisibility performance in the frequency domain by up to 24.9% when contrasted with prior methods. Moreover, the method attains superior image quality (>50 dB) in the spatial domain, accompanied by a 100% success rate in watermark extraction in the absence of attacks. This underscores its capability to uphold the efficacy of the protected network and preserve the integrity of the watermarking process. It always maintains excellent imperceptibility and robustness. Thus, the framework shows great potential as a state-of-the-art solution for protecting intellectual property. Full article
Show Figures

Figure 1

25 pages, 4382 KiB  
Article
Covert Communication through Robust Fragment Hiding in a Large Number of Images
by Pengfei Wang, Hua Zhong, Yapei Feng, Liangbiao Gong, Yuxiang Tang, Zhe-Ming Lu and Lixin Wang
Sensors 2024, 24(2), 627; https://doi.org/10.3390/s24020627 - 18 Jan 2024
Viewed by 1624
Abstract
For covert communication in lossy channels, it is necessary to consider that the carrier of the hidden watermark will undergo multiple image-processing attacks. In order to ensure that secret information can be extracted without distortion from the watermarked images that have undergone attacks, [...] Read more.
For covert communication in lossy channels, it is necessary to consider that the carrier of the hidden watermark will undergo multiple image-processing attacks. In order to ensure that secret information can be extracted without distortion from the watermarked images that have undergone attacks, in this paper, we design a novel fragmented secure communication system. The sender will fragment the secret data to be transmitted and redundantly hide it in a large number of multimodal carriers of messenger accounts on multiple social platforms. The receiver receives enough covert carriers, extracts each fragment, and concatenates the transmitted secret data. This article uses the image carrier as an example to fragment the text file intended for transmission and embeds it into a large number of images, with each fragment being redundant and embedded into multiple images. In this way, at the receiving end, only enough stego images need to be received to extract the information in each image, and then concatenate the final secret file. In order to resist various possible attacks during image transmission, we propose a strong robust image watermarking method. This method adopts a watermark layer based on DFT, which has high embedding and detection efficiency and good invisibility. Secondly, a watermark layer based on DCT is adopted, which can resist translation attacks, JPEG attacks, and other common attacks. Experiments have shown that our watermarking method is very fast; both the embedding time and the extraction time are less than 0.15 s for images not larger than 2000×2000. Our watermarking method has very good invisibility with 41 dB PSNR on average. And our watermarking method is more robust than existing schemes and robust to nearly all kinds of attacks. Based on this strong robust image watermarking method, the scheme of fragmenting and hiding redundant transmission content into a large number of images is effective and practical. Our scheme can 100% restore the secret file completely under different RST or hybrid attacks, such as rotation by 1 degree and 5 degrees, scaling by 1.25 and 0.8, and cropping by 10% and 25%. Our scheme can successfully restore the secret file completely even if 30% of received images are lost. When 80% of received images are lost, our scheme can still restore 61.1% of the secret file. If all stego images can be obtained, the original text file can be completely restored. Full article
(This article belongs to the Special Issue Image Processing in Sensors and Communication Systems)
Show Figures

Figure 1

20 pages, 1159 KiB  
Article
Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition for Enhanced Imperceptibility and Robustness
by Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Algorithms 2024, 17(1), 32; https://doi.org/10.3390/a17010032 - 12 Jan 2024
Cited by 7 | Viewed by 4981
Abstract
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today’s new challenging issues. To address [...] Read more.
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity verification are today’s new challenging issues. To address these issues, digital image watermarking techniques have been proposed by several researchers. Image watermarking can be conducted through several transformations, such as discrete wavelet transform (DWT), singular value decomposition (SVD), orthogonal matrix Q and upper triangular matrix R (QR) decomposition, and non-subsampled contourlet transform (NSCT). However, a single transformation cannot simultaneously satisfy all the design requirements of image watermarking, which makes a platform to design a hybrid invisible image watermarking technique in this work. The proposed work combines four-level (4L) DWT and two-level (2L) SVD. The Arnold map initially encrypts the watermark image, and 2L SVD is applied to it to extract the s components of the watermark image. A 4L DWT is applied to the host image to extract the LL sub-band, and then 2L SVD is applied to extract s components that are embedded into the host image to generate the watermarked image. The dynamic-sized watermark maintains a balanced visual impact and non-blind watermarking preserves the quality and integrity of the host image. We have evaluated the performance after applying several intentional and unintentional attacks and found high imperceptibility and improved robustness with enhanced security to the system than existing state-of-the-art methods. Full article
Show Figures

Figure 1

15 pages, 2247 KiB  
Article
Invisible Shield: Unveiling an Efficient Watermarking Solution for Medical Imaging Security
by Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro
Appl. Sci. 2023, 13(24), 13291; https://doi.org/10.3390/app132413291 - 15 Dec 2023
Cited by 5 | Viewed by 2107
Abstract
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity without compromising confidentiality. However, applying conventional encryption techniques directly [...] Read more.
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity without compromising confidentiality. However, applying conventional encryption techniques directly to e-health data encounters hurdles, including limitations in data size, redundancy, and capacity, particularly in open-channel patient data transmissions. As a result, the unique characteristics of images, marked by their risk of data loss and the need for confidentiality, make preserving the privacy of data contents a complex task. This underscores the pressing need for innovative approaches to ensure the security and confidentiality of sensitive healthcare information within medical images. The proposed algorithm outperforms referenced algorithms in both image fidelity and steganographic capacity across diverse medical imaging modalities. It consistently achieves higher Peak Signal-to-Noise Ratio (PSNR) values, indicating superior image fidelity, reduced noise, and preserved signal quality in CT, MRI, ultrasound, and X-ray modalities. The experimental results demonstrate a considerable improvement in both the Peak Signal-to-Noise Ratio (PSNR) and maximum embedding capacity. Specifically, the average PSNR value for the X-ray modality reached a notable 73 dB, signifying superior image quality. Moreover, the CT modality exhibited the highest maximum embedding capacity, measured at 0.52, showcasing its efficiency in accommodating data within the images. Moreover, the algorithm consistently offers increased steganographic data hiding capacity in these images without perceptibly degrading their quality or integrity. Full article
(This article belongs to the Special Issue Recent Advances in Multimedia Steganography and Watermarking)
Show Figures

Figure 1

22 pages, 9003 KiB  
Article
Robust Watermarking Algorithm for Building Information Modeling Based on Element Perturbation and Invisible Characters
by Qianwen Zhou, Changqing Zhu and Na Ren
Appl. Sci. 2023, 13(23), 12957; https://doi.org/10.3390/app132312957 - 4 Dec 2023
Viewed by 1936
Abstract
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on BIM exchange formats and cannot adapt to BIM [...] Read more.
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on BIM exchange formats and cannot adapt to BIM data, a novel watermarking algorithm specifically designed for BIM data, which combines element perturbation and invisible character embedding, is proposed. The proposed algorithm first calculates the centroid of the enclosing box to locate the elements, and establishes a synchronous relationship between the element coordinates and the watermarked bits using a mapping mechanism, by which the watermarking robustness is effectively enhanced. Taking into consideration both data availability and the need for watermark invisibility, the algorithm classifies the BIM elements based on their mobility, and perturbs the movable elements while embedding invisible characters within the attributes of the immovable elements. Then, the watermark information after dislocation is embedded into the data. We use building model and structural model BIM data to carry out the experiments, and the results demonstrate that the signal-to-noise ratio and peak signal-to-noise ratio before and after watermark embedding are both greater than 100 dB. In addition, the increased information redundancy accounts for less than 0.15% of the original data., which means watermark embedding has very little impact on the original data. Additionally, the NC coefficient of watermark extraction is higher than 0.85 when facing attacks such as translation, element addition, element deletion, and geometry–property separation. These findings indicate a high level of imperceptibility and robustness offered by the algorithm. In conclusion, the robust watermarking algorithm for BIM data fulfills the practical requirements and provides a feasible solution for protecting the copyright of BIM data. Full article
(This article belongs to the Special Issue Recent Advances in Multimedia Steganography and Watermarking)
Show Figures

Figure 1

Back to TopTop