46
Views
0
CrossRef citations to date
0
Altmetric
Articles

Multimedia Authentication Through Digital Tattooing Scheme at IoT Perception Layer for Smart City

, &

References

  • L. Atzori, A. Iera, and G. Mora-Bito, “The internet of things: A survey,” Comput. Netw., Vol. 54, no. 15, pp. 2787–805, 2010.
  • S. Greengard, The Internet of Things. Cambridge, MA: MIT Press, 2021.
  • R. L. Rivest, “Chapter 13 - Cryptography,” in Handbook of Theoretical Computer Science, Algorithms and Complexity, J. Van Leeuwen, Ed. Elsevier, 1990, pp. 717–755.
  • O. Z. To˘guz, “Data protection and intellectual property in the EU and Turkey,” Master’s thesis, 2010.
  • M. Jana, and B. Jana, “A new DCT based robust image watermarking scheme using cellular automata,” Inf. Sec. J. A Global Perspect., Vol. 31, no. 5, pp. 527–43, 2021.
  • P. Pal, B. Jana, and J. Bhaumik, “A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix,” Multimedia Tools Appl., Vol. 80, no. 14, pp. 21651–78, 2021.
  • A. Dey, P. Pal, P. Chowdhuri, B. Jana, S. Jana, and A.-l. Singha, “Dual image based watermarking scheme using quorum function,” in International Conference on Emerging Applications of Information Technology, Singapore, Springer, 2021, pp. 114–23.
  • S. Jana, B. Jana, P. K. Singh, and P. Bera, “Voronoi diagrams based digital tattoo for multimedia data protection,” in Proceedings of Advanced Network Technologies and Intelligent Computing: First International Conference, ANTIC 2021, Varanasi, India, December 17–18, 2021. Cham: Springer International Publishing, 2022, February, pp. 777–93.
  • P. K. Singh, B. Jana, and K. Datta, “Fuzzy proximity-based robust data hiding scheme with interval threshold,” Soft. Comput., pp. 1–18, 2022 Oct 11. DOI: 10.1007/s00500-022-07552-4. Epub ahead of print. PMID: 36249952; PMCID: PMC9552164.
  • M. Sajeer, A. Mishra, and P. S. Sathidevi, “Recent advances in transform and hybrid domain digital watermarking techniques—a survey,” in Soft Computing for Security Applications. Advances in Intelligent Systems and Computing, 1397, G. Ranganathan, X. Fernando, F. Shi, and Y. El Allioui, Eds. Singapore: Springer, 2022, pp. 841–57. https://doi.org/10.1007/978-981-16-5301-8_59.
  • O. Evsutin, and K. Dzhanashia, “Watermarking schemes for digital images: Robustness overview,” Signal Process. Image Commun., Vol. 100, pp. 116523, 2021.
  • P. Garg, and A. K. Jain, “Digital watermarking techniques and their analysis,” in Smart Systems: Innovations in Computing. Smart Innovation, Systems and Technologies, Vol. 235, A. K. Somani, A. Mundra, R. Doss, and S. Bhattacharya, Eds. Singapore: Springer, 2022, pp. 41–54. DOI:10.1007/978-981-16-2877-1_5
  • J. Zhao, E. Koch, and C. Luo, “In business today and tomorrow,” Commun. ACM, Vol. 41, no. 7, pp. 67–72, 1998.
  • J. S. Sobolewski, “Cyclic redundancy check,” in Encyclopedia of Computer Science, UK: John Wiley and Sons Ltd, Jan. 2003, pp. 2080.
  • S. Tyagi, H. V. Singh, and R. Agarwal, “Image watermarking using genetic algorithm in DCT domain,” in 2017 International Conference on Inventive Systems and Control (ICISC). Coimbatore: IEEE, 2017, pp. 1–6. DOI:10.1109/ICISC.2017.8068743.
  • A. Siddiqui, and A. Kaur, “A secure and robust image watermarking system using wavelet domain,” in 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence. Noida: IEEE, 2017. pp. 599–604. DOI:10.1109/CONFLUENCE.2017.7943222.
  • D. Singh, and S. K. Singh, “DCT based efficient fragile watermarking scheme for image authentication and restoration,” Multimedia Tools Appl., Vol. 76, no. 1, pp. 953–77, 2017.
  • M. R. Mirzaei, M. Karimi, N. Karimi, and S. Samavi, “Blind image watermarking based on local analysis of gradients,” in 2017 Iranian Conference on Electrical Engineering (ICEE). Tehran: IEEE, 2017, pp. 1891–1894. doi:10.1109/IranianCEE.2017.7985362.
  • A. K. Khanna, N. R. Roy, and B. Verma, “Digital image watermarking and its optimization using genetic algorithm,” in 2016 International Conference on Computing, Communication and Automation (IC-CCA). Greater Noida: IEEE, 2016, pp. 1140–1144. DOI:10.1109/CCAA.2016.7813888.
  • A. Susanto, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, “Hybrid method using HWT-DCT for image watermarking,” in 2017 5th International Conference on Cyber and IT Service Management (CITSM). Denpasar: IEEE, 2017, pp. 1–5. DOI:10.1109/CITSM.2017.8089252.
  • M. Heidari, N. Karimi, and S. Samavi, “A hybrid DCT-SVD based image watermarking algorithm,” in 2016 24th Iranian Conference on Electrical Engineering (ICEE). Shiraz: IEEE, 2016, pp. 838–843. DOI:10.1109/IranianCEE.2016.7585636.
  • S. Fadoua, A. Noura, and T. Hamid, “A new robust watermarking scheme based on polynomial decomposition,” in 2017 Intelligent Systems and Computer Vision (ISCV). IEEE, 2017.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.