REFERENCES
- W. Zhu, and W. Gao, “Multimedia intelligence: When multimedia meets artificial intelligence,” IEEE Trans. Multimed., Vol. 2, no. 7, pp. 1823–35, 2021.
- J. Gohil, J. Patel, and M. Shah, “Content watermarking and data hiding in multimedia security,” Adv. Sec. Sol. Multimedia, 2053–563, 2021.
- F. Al-Shaarani, and A. Gutub, “Securing matrix counting-based secret-sharing involving crypto steganography,” J. King Saud Univ.-Comput. Inf. Sci., Vol. 34, no. 9, pp. 6909–24, 2022.
- N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image steganography: A review of the recent advances,” IEEE. Access., Vol. 9, pp. 23409–23, 2022.
- M. Das, X. Tao, and J. C. Cheng, “BIM security: A critical review and recommendations using encryption strategy and blockchain,” Autom. Constr., Vol. 126, pp. 103682, 2021.
- T. S. Prakash, A. S. Kumar, C. R. B. Durai, and S. Ashok, “Enhanced Elman spike neural network optimized with flamingo search optimization algorithm espoused lung cancer classification from CT images,” Biomed. Signal. Process. Control., Vol. 84, pp. 104948, 2023.
- V. Krishnakumar, and R. Asokan, “Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET,” Peer-to-Peer Netw. Appl., 1–18, 2023.
- https://www.kaggle.com/datasets/felicepollano/watermarked-not-watermarked-images.
- S. K. Khare, V. Bajaj, and G. R. Sinha, “Adaptive tunable Q wavelet transform-based emotion identification,” IEEE Trans. Instrum. Meas., Vol. 69, no. 12, pp. 9609–17, 2020.
- J. Zhu, R. Hong, H. Zhang, R. Gu, H. Wang, and F. Sun, “Fired bullet signature correlation using the finite ridgelet transform (FRIT) and the gray level co- occurrence matrix (GLCM) methods,” Forensic Sci. Int., Vol. 330, pp. 111089, 2020.
- X. L. Huang, Y. X. Dong, K. X. Jiao, and G. D. Ye, “Asymmetric pixel confusion algorithm for images based on RSA and Arnold transform,” Front. Inf. Technol. Electron. Eng., Vol. 21, no. 12, pp. 1783–94, 2020.
- S. Ning, Y. He, A. Farhan, Y. Wu, and J. Tong, “A method for the localization of partial discharge sources in transformers using TDOA and truncated singular value decomposition,” IEEE Sensors J., Vol. 21, no. 5, pp. 6741–51, 2020.
- W. Zhiheng, and L. Jianhua, “Flamingo search algorithm: A new swarm intelligence optimization algorithm,” IEEE. Access., Vol. 9, pp. 88564–82, 2021.
- S. Sharma, H. Sharma, J. B. Sharma, and R. C. Poonia, “A secure and robust color image watermarking using nature-inspired intelligence,” Neural Comput. Appl., Vol. 35, pp. 1–19, 2021.
- S. Sharma, H. Sharma, and J. B. Sharma, “Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain,” Multimed. Tools. Appl., Vol. 80, no. 12, pp. 18753–85, 2021.
- Y. Shen, C. Tang, M. Xu, M. Chen, and Z. Lei, “A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO,” Expert. Syst. Appl., Vol. 168, pp. 114414, 2021.
- R. Ramasamy, and V. Arumugam, “Robust image watermarking using fractional Krawtchouk transform with optimization,” J. Ambient. Intell. Humaniz. Comput., Vol. 12, no. 7, pp. 7121–32, 2021.
- A. M. Cheema, S. M. Adnan, and Z. Mehmood, “A novel optimized semi-blind scheme for color image watermarking,” IEEE. Access., Vol. 8, pp. 169525–47, 2020.
- P. Garg, and R. R. Kishore, “Optimized color image watermarking through watermark strength optimization using particle swarm optimization technique,” J. Inf. Optim. Sci., Vol. 41, no. 6, pp. 1499–512, 2020.