Article
Computer Science, Information Systems
Solihah Gull, Romany F. Mansour, Nojood O. Aljehane, Shabir A. Parah
Summary: Smart healthcare is revolutionizing the traditional healthcare system by leveraging IoT, cloud computing, AI, and big data to provide more convenient, efficient, and personalized medical services. This paper introduces a secure self-embedding fragile watermarking scheme for authenticating medical images and precisely localizing tampered regions. The proposed algorithm achieves better tamper detection and localization results with higher embedding capacity and improved visual quality compared to state-of-the-art techniques, making it a viable option for smart health applications.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Engineering, Biomedical
Gokhan Azizoglu, Ahmet Nusret Toprak
Summary: This paper proposes a novel reversible fragile digital watermarking method for tamper localization and authenticity and integrity protection in medical images. The method divides the host image into 8x8 non-overlapped blocks and applies a Discrete Wavelet Transform to transform the image to the frequency domain, where the watermark information is embedded. The image is then converted back to the spatial domain using an inverse Discrete Wavelet Transform, and an intelligent optimization technique is used to correct rounding errors and maximize imperceptibility.
BIOMEDICAL SIGNAL PROCESSING AND CONTROL
(2023)
Article
Mathematics, Interdisciplinary Applications
Guoqiang Long, Xiuli Chai, Zhihua Gan, Donghua Jiang, Xin He, Mengge Sun
Summary: This paper presents a one-dimensional exponential Chebyshev chaotic map for multimedia security. The chaotic dynamics of the map are thoroughly examined using bifurcation diagram, Lyapunov exponents, sample entropy, and permutation entropy. A visually meaningful image encryption scheme based on this chaotic map is proposed, which includes a method to eliminate the correlation of adjacent pixels and an adaptive embedding method to fuse privacy information into carrier images. The scheme also introduces secret image share and authentication information for disaster-tolerance performance and distributed management and storage of data. Simulation results show satisfactory security and robustness, with steganographic images achieving a visual quality above 50.9 dB.
CHAOS SOLITONS & FRACTALS
(2023)
Article
Mathematics, Interdisciplinary Applications
Jinyuan Liu, Yong Wang, Qi Han, Jerry Gao
Summary: A image encryption algorithm based on a 4D chaotic map and steganography is proposed in this paper, which enhances security by controlling the generation of chaotic sequences and embedding hash values.
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS
(2022)
Article
Computer Science, Information Systems
Rishi Sinhal, Sachin Sharma, Irshad Ahmad Ansari, Varun Bajaj
Summary: Digital medical images are important for diagnosis, and protecting them against tampering is crucial. This manuscript introduces a multipurpose medical image watermarking scheme that offers copyright protection, tamper detection, and ROI recovery.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Muzamil Hussan, Shabir A. Parah, G. J. Qureshi
Summary: In this paper, a reversible embedding framework is proposed to secure data and authenticate received content. The framework utilizes the BBHBS mechanism for data embedding and calculates MABV or MAC for content authentication.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Aditya Kumar Sahu, Monalisa Sahu, Pramoda Patro, Gupteswar Sahu, Soumya Ranjan Nayak
Summary: This study proposes an efficient dual image-based reversible fragile watermarking scheme that accurately detects and locates tampering regions in images. The scheme achieves high capacity, better perceptual transparency, and robustness. Experimental results demonstrate its effectiveness and resistance against various attacks.
PATTERN ANALYSIS AND APPLICATIONS
(2023)
Review
Computer Science, Information Systems
Rasha Thabit
Summary: This paper provides a detailed review of medical image authentication (MIA) techniques, focusing on the protection of medical image integrity and highlighting various methods for detecting and recovering tampered regions. The paper also classifies MIA schemes based on their objectives and embedding domains, while discussing performance evaluation measures commonly used in this field. The conclusions and recent trends in this area of research are summarized, emphasizing the importance of ongoing developments in MIA technology.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Ertugrul Gul, Serkan Ozturk
Summary: The proposed method introduces a novel pixel-wise authentication-based self-embedding fragile watermarking method for manipulation detection and recovery. By dividing the reference image into main blocks and spreading recovery bits, the method effectively detects and recovers manipulated areas, enhancing the accuracy of authentication.
MULTIMEDIA SYSTEMS
(2021)
Article
Computer Science, Information Systems
Hira Aftab, Mehdi Hussain, Qaiser Riaz, Muhammad Zeeshan, Ki-Hyun Jung
Summary: This research proposes a novel high-capacity-based reversible data embedding strategy for e-healthcare applications. The strategy replaces traditional embedding and interpolation techniques with a pixel-to-block-level transformation, repeated pixel differencing, and conditional pixel permutation. Experimental results show that the proposed scheme achieved high embedding capacity, acceptable visual imperceptibility, and tamper detection.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Tayseer Karam Alshekly, Ekhlas Abbas Albahrani, Sadeq H. Lafta
Summary: The article proposes a method for constructing substitution-permutation boxes based on the Qi Hyperchaotic System to generate more robust S-Boxes. The new S-Boxes are analyzed and tested for various criteria, and the results show that the proposed method is suitable for designing S-Boxes widely used in block ciphers. The S-Boxes are applied to a new image encryption algorithm.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Siddharth Bhalerao, Irshad Ahmad Ansari, Anil Kumar
Summary: Security is the most important aspect in the transmission and handling of medical data. Different schemes such as encryption, steganography, and watermarking are used to ensure the safety of medical signals. This article proposes a reversible watermarking scheme for ECG signal security, which is capable of establishing ownership, detecting tampering, and partially restoring tampered ECG signals.
CIRCUITS SYSTEMS AND SIGNAL PROCESSING
(2022)
Article
Chemistry, Physical
Zhen Su, Depeng Li, Lixin Zhang, Si Tian, Yuhong Su, Xiaoyun Hu, Duan Xiong, Qingqing Guan
Summary: In this study, a multi-responsive smart material with full reversibility and dual-visual read-out channel was developed. The material could undergo fully reversible conversion between three forms stimulated by water or formaldehyde molecule, and it exhibited colorimetric and luminescent changes. Different reversible behaviors were observed when the material was incorporated in different polymer matrices.
Article
Multidisciplinary Sciences
Md. Ahasan Kabir
Summary: This study introduces a new watermarking algorithm for authentication and forgery detection of multimedia data. The algorithm transforms the watermark image, encrypts the wavelet coefficients, inserts the encrypted bits into the cover image, and detects tampering efficiently.
SN APPLIED SCIENCES
(2021)
Article
Computer Science, Information Systems
Durgesh Singh, Sanjay K. Singh, Sandeep Sambhaji Udmale
Summary: In this paper, a self-embedding block-wise fragile image watermarking scheme is proposed for authentication, localization, and recovery with enhanced accuracy. The scheme splits the cover image into non-overlapping blocks and calculates restoration and authentication bits from the MSBs planes. The proposed scheme achieves high-quality restoration and significant authentication possibilities for each block, with high Peak Signal to Noise Ratio and Normalized Correlation Coefficient up to 50% tampering rate.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Telecommunications
Sumina Sidiq, Javaid A. Sheikh, Farhana Mustafa, Bilal A. Malik
Summary: In this article, a hybrid optimization technique is proposed to enhance the energy efficiency of ultra-dense networks (UDNs). By considering user correlation and optimizing the density and transmitting power of small-cell base stations (SBSs), the problem is divided into two sub-problems and solved using a heuristic algorithm. Simulation results show that the proposed method significantly improves the energy efficiency of the system with low computational complexity.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2022)
Article
Computer Science, Information Systems
Sheezan Fayaz, Shabir A. Parah, G. J. Qureshi
Summary: This article proposes an effective algorithm called Modified Underwater Dark Channel Prior (MUWDCP) for haze removal in underwater images based on image prior. The algorithm computes underwater dark channel information using only blue-green channels, taking advantage of the fact that red color undergoes high absorption and drops at about a depth of 3m. To improve atmospheric light estimation, the algorithm introduces a novel global atmospheric light estimation method based on arithmetic Mode operation. Unlike most methods, MUWDCP estimates transmission maps of all three-color channels while maintaining low computational complexity. Experimental results demonstrate that MUWDCP provides significantly improved visual quality compared to state-of-the-art algorithms.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Zahid A. Bhat, Javaid A. Sheikh, Sharief D. Khan, Ishfaq Bashir, Shabir A. Parah
Summary: This paper presents a large frequency ratio dual band band-pass filter for 5G communication and body-centric applications. The proposed filter shows promising potential in multi-band operating systems, particularly in 5G communication systems with body-centric applications.
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING
(2023)
Article
Engineering, Electrical & Electronic
Shazia Ashraf, Javaid A. Sheikh, Umhara Rasool, Zahid Ahmad Bhat
Summary: This study presents a parasitic wide band compact planar antenna for 5G mm-wave applications, with high bandwidth and enhanced gain achieved through the use of reflector elements and optimized dimensions and materials.
INTERNATIONAL JOURNAL OF ELECTRONICS
(2023)
Article
Engineering, Electrical & Electronic
Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh, Amir H. Gandomi, Mohammad Hijji, Brij B. Gupta, Khan Muhammad
Summary: Heritage multimedia is a valuable cultural asset that provides insights into earlier generations and their creative approach, lifestyle, and historical ideologies. It is also an important resource for boosting the local economy, sustainable communities, and tourism and business sectors. With the advancements in technology and 5G networks, protecting heritage media from unauthorized consumers is crucial. This study proposes a robust and blind watermarking-framework for cultural images (RBWCI) that uses the discrete cosine transform domain for ownership verification and copyright protection.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
(2023)
Review
Computer Science, Information Systems
Solihah Gull, Shabir A. Parah
Summary: This paper presents a detailed review of the application of watermarking in healthcare setups, specifically in the context of COVID-19. It discusses the security and privacy protection provided by watermarking, focusing on the protection of medical image data. The paper also classifies and presents existing medical image watermarking techniques, highlighting their drawbacks, and discusses evaluation parameters and challenges in this research area.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Shaista Mansoor, Shabir A. Parah
Summary: This paper proposes a distinctive Hybrid Adaptive Image Encryption (HAIE) scheme that modifies the chaotic system's initial conditions and control parameters using statistical parameters of the plain image. The scheme involves two chaotic maps, logistic map and tent map, to generate pseudo-random sequences. The encrypted image is a hybrid image obtained by permuting half of the plain image using the logistic map and the other half using the tent map. Experimental results show that the scheme has good encryption effect, can resist various attacks, and is highly robust against noise and cropping attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Kamran I. Naqash, Shahid A. Malik, Shabir A. Parah
Summary: This paper proposes a new, hybrid, and purely data-driven method for watermarking audio and speech signals using iterative filtering and singular value decomposition. The method focuses on the robustness of the audio signals against various signal processing attacks while providing a significant boost in imperceptibility and payload. It provides a strikingly excellent balance between the characteristics of watermarking.
CIRCUITS SYSTEMS AND SIGNAL PROCESSING
(2023)
Article
Automation & Control Systems
Parsa Sarosh, Shabir Ahmad Parah, Bilal Ahmad Malik, Mohammad Hijji, Khan Muhammad
Summary: This article presents a cybersecurity framework for medical images in a smart healthcare system. It introduces two novel two-dimensional chaotic maps that generate highly robust cipher images, protecting medical data against cyberattacks. The proposed solution ensures data privacy and a seamless treatment experience.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Information Systems
Muzamil Hussan, Shabir A. Parah, G. J. Qureshi
Summary: In this paper, a reversible embedding framework is proposed to secure data and authenticate received content. The framework utilizes the BBHBS mechanism for data embedding and calculates MABV or MAC for content authentication.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Muzaffar A. Najar, Khurshed A. Shah, Shabir A. Parah
Summary: This paper examines the impact of fluorination on zigzag/armchair silicene nanoribbon and models a spin diode based on half-fluorinated zigzag silicene nanoribbon. By calculating the spin-dependent transport characteristics, the performance of this model device is evaluated and spin diode logic operations are realized.
IEEE TRANSACTIONS ON NANOTECHNOLOGY
(2023)
Article
Multidisciplinary Sciences
Aiman Jan, Shabir A. Parah, Muzamil Hassan, Bilal A. Malik
Summary: Information technology plays a crucial role in various aspects of life, but it also carries the risk of data breach and modification. This paper introduces a novel image steganography technique that utilizes edge detection and chaotic functions to hide sensitive information and enhance data security through encryption.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Information Systems
Samrah Mehraj, Subreena Mushtaq, Shabir A. Parah, Kaiser J. Giri, Javaid A. Sheikh, Amir H. Gandomi, Mohammad Hijji, Khan Muhammad
Summary: This study proposes a spatial domain-based blind and robust watermarking scheme for the ownership verification of colored cultural heritage images. By embedding watermarks in the Y element of the YCbCr space, this scheme demonstrates improved robustness and lower computational complexity compared to frequency-domain-based techniques.
Article
Computer Science, Information Systems
Aiman Jan, Shabir A. Parah, Bilal A. Malik
Summary: Smart cities aim to improve quality of life through technological advancements. One important innovation is the design, implementation, and management of big-data Smart Healthcare systems. Smart health systems require timely access to high-resolution medical images, which make up about 80% of medical data. These images contain sensitive information and need to be encrypted to prevent unauthorized access.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)