Resource Type

Journal Article 8

Year

2023 2

2020 1

2019 1

2018 1

2017 1

2016 2

Keywords

Copyright protection 2

Adaptive watermarking 1

Analysis filter 1

Audio watermarking 1

Color medical image 1

Contourlet embedding representation 1

Data hiding 1

De-correlation 1

Digital rights 1

Encryption 1

Fractional transform 1

Information security 1

Internet of Things 1

Level-direction decomposition analysis 1

Linear prediction 1

Low Earth orbit (LEO) 1

Machine learning 1

Massive connectivity 1

Multi-resolution decomposition 1

open ︾

Search scope:

排序: Display mode:

Discrete fractional watermark technique Correspondence

Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.2000133

Abstract: The fractional logistic map holds rich dynamics and is adopted to generate chaotic series. A image is then encrypted and inserted into the original images. Since the encryption image takes the fractional order within (0, 1], it increases the key space and becomes difficult to attack. This study provides a robust method in the protection of the copyright of hardware, images, and other electronic files.

Keywords: 离散分数阶微积分;图像加密;水印    

A subband excitation substitute based scheme for narrowband speech watermarking Article

Wei LIU, Ai-qun HU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 5,   Pages 627-643 doi: 10.1631/FITEE.1601503

Abstract: We propose a new narrowband speech watermarking scheme by replacing part of the speech with a scaled and spectrally shaped hidden signal. Theoretically, it is proved that if a small amount of host speech is modified, then not only an ideal channel model for hidden communication can be established, but also high imperceptibility and good intelligibility can be achieved. Furthermore, a practical system implementation is proposed. At the embedder, the power normalization criterion is first imposed on a passband watermark signal by forcing its power level to be the same as the original passband excitation of the cover speech, and a synthesis filter is then used to spectrally shape the scaled watermark signal. At the extractor, a bandpass filter is first used to get rid of the out-of-band signal, and an analysis filter is then employed to compensate for the distortion introduced by the synthesis filter. Experimental results show that the data rate is as high as 400 bits/s with better bandwidth efficiency, and good imperceptibility is achieved. Moreover, this method is robust against various attacks existing in real applications.

Keywords: Analysis filter     Linear prediction     Narrowband speech watermarking     Passband excitation replacement     Power normalization     Spectral envelope shaping     Synthesis filter    

A robust intelligent audio watermarking scheme using support vector machine Article

Mohammad MOSLEH,Hadi LATIFPOUR,Mohammad KHEYRANDISH,Mahdi MOSLEH,Najmeh HOSSEINPOUR

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 12,   Pages 1320-1330 doi: 10.1631/FITEE.1500297

Abstract: Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized cop-ying and distribution. Digital watermark technology is starting to be considered a credible protection method to mitigate the potential challenges that undermine the efficiency of the system. Digital audio watermarking should retain the quality of the host signal in a way that remains inaudible to the human hearing system. It should be sufficiently robust to be resistant against potential attacks. One of the major deficiencies of conventional audio watermarking techniques is the use of non-intelligent decoders in which some sets of specific rules are used for watermark extraction. This paper presents a new robust intelligent audio water-marking scheme using a synergistic combination of singular value decomposition (SVD) and support vector machine (SVM). The methodology involves embedding a watermark data by modulating the singular values in the SVD transform domain. In the extraction process, an intelligent detector using SVM is suggested for extracting the watermark data. By learning the destructive effects of noise, the detector in question can effectively retrieve the watermark. Diverse experiments under various conditions have been carried out to verify the performance of the proposed scheme. Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques.

Keywords: Audio watermarking     Copyright protection     Singular value decomposition (SVD)     Machine learning     Support vector machine (SVM)    

Level-direction decomposition analysis with a focus on image watermarking framework Article

M. F. KAZEMI,M. A. POURMINA,A. H. MAZINAN

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 11,   Pages 1199-1217 doi: 10.1631/FITEE.1500165

Abstract: This research addresses the new level-direction decomposition in the area of image watermarking as the further development of investigations. The main process of realizing a watermarking framework is to generate a watermarked image with a focus on contourlet embedding representation. The approach performance is evaluated through several indices including the peak signal-to-noise ratio and structural similarity, whereby a set of attacks are carried out using a module of simulated attacks. The obtained information is analyzed through a set of images, using different color models, to enable the calculation of normal correlation. The module of the inverse of contourlet embedding representation is correspondingly employed to obtain the present watermarked image, as long as a number of original images are applied to a scrambling module, to represent the information in disorder. This allows us to evaluate the performance of the proposed approach by analyzing a complicated system, where a decision making system is designed to find the best level and the corresponding direction regarding contourlet embedding representation. The results are illustrated in appropriate level-direction decomposition. The key contribution lies in using a new integration of a set of subsystems, employed based upon the novel mechanism in contourlet embedding representation, in association with the decision making system. The presented approach is efficient compared with state-of-the-art approaches, under a number of serious attacks. A number of benchmarks are obtained and considered along with the proposed framework outcomes. The results support our ideas.

Keywords: Level-direction decomposition analysis     Watermarking framework     Contourlet embedding representation     Scrambling module     Simulated attacks    

On the role of optimization algorithms in ownership-preserving data mining None

Muhammad KAMRAN, Ehsan Ullah MUNIR

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 151-164 doi: 10.1631/FITEE.1601479

Abstract: Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Wa-termarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives: (1) preserving the knowledge stored in the data; (2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark em-bedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics.

Keywords: Information security     Optimization     Digital rights     Watermarking    

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation Research Articles

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 7,   Pages 946-963 doi: 10.1631/FITEE.1700667

Abstract:

This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation. The principal objective of the presented scheme is to simultaneously meet all the four requirements (robustness, security, imperceptibility, and capacity) of a good watermarking scheme. The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet. To do so, different approaches are combined in a way that the four requirements are achieved. For instance, to obtain imperceptibility, the three color channels (red, green, and blue) are de-correlated using principal component analysis, and the first principal component (de-correlated red channel) is chosen for watermark embedding. Afterwards, to achieve robustness, the de-correlated channel is decomposed using a discrete wavelet transform (DWT), and the approximate band (the other three bands are kept intact to preserve the edge information) is further decomposed into distinct blocks. The random blocks are chosen based on a random generated key. The random selected blocks are further broken down into singular values and vectors. Based on the mutual dependency on singular values and vectors’ matrices, the values are modified depending on the watermarking bits, and their locations are saved and used as another key, required when the watermark is to be extracted. Consequently, two-level authentication levels ensure the security, and using both singular values and vectors increases the capacity of the presented scheme. Moreover, the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme. Finally, to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility (peak signal-to-noise ratio and structural similarity index), security (with numerous fake keys), robustness (normalized correlation and bit error rate), and capacity, the Gonzalez and Kodak datasets are used. The comparison shows significant improvement of the proposed scheme over existing schemes.

Keywords: Copyright protection     Data hiding     Multi-resolution decomposition     De-correlation     Security    

Satellite Internet of Things: challenges, solutions, and development trends Review

Xiaoming CHEN, Zhaobin XU, Lin SHANG,chen_xiaoming@zju.edu.cn,zjuxzb@zju.edu.cn,shangl@microsate.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7,   Pages 935-944 doi: 10.1631/FITEE.2200648

Abstract: Satellite (IoT) is a promising way to provide seamless coverage to a massive number of devices all over the world, especially in remote areas not covered by cellular networks, e.g., forests, oceans, mountains, and deserts. In general, satellite IoT networks take satellites as access points, which solves the problem of wide coverage, but leads to many challenging issues. We first give an overview of satellite IoT, with an emphasis on revealing the characteristics of IoT services. Then, the challenging issues of satellite IoT, i.e., , wide coverage, high mobility, low power, and stringent delay, are analyzed in detail. Furthermore, the possible solutions to these challenges are provided. In particular, new massive access protocols and techniques are designed according to the characteristics and requirements of satellite IoT. Finally, we discuss several development trends of satellite IoT to stimulate and encourage further research in such a broad area.

Keywords: Internet of Things     Satellite communications     Low Earth orbit (LEO)     Massive connectivity     Random access    

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7,   Pages 1045-1061 doi: 10.1631/FITEE.2200372

Abstract: algebra has been used to apply the fractional Fourier transform (FrFT) to color images in a comprehensive approach. However, the discrete fractional random transform (DFRNT) with adequate basic randomness remains to be examined. This paper presents a novel multistage privacy system for s based on discrete fractional Fourier transform (DQFrFT) watermarking and . First, we describe DFRNT (QDFRNT), which generalizes DFRNT to handle signals effectively, and then use QDFRNT to perform . To efficiently evaluate QDFRNT, this study derives the relationship between the QDFRNT of a signal and the four components of the DFRNT signal. Moreover, it uses the human vision system’s (HVS) masking qualities of edge, texture, and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the using the QDFRNT-based and support vector machine (SVM) techniques. The limitations of watermark embedding are also explained to conserve watermarking energy. Second, 3D-CLM is employed to improve the system’s security and efficiency, allowing it to be used as a multistage privacy system. The proposed security system is effective against many types of channel noise attacks, according to simulation results.

Keywords: Color medical image     Quaternion     Adaptive watermarking     Encryption     Fractional transform     Three-dimensional chaotic logistic map (3D-CLM)    

Title Author Date Type Operation

Discrete fractional watermark technique

Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr

Journal Article

A subband excitation substitute based scheme for narrowband speech watermarking

Wei LIU, Ai-qun HU

Journal Article

A robust intelligent audio watermarking scheme using support vector machine

Mohammad MOSLEH,Hadi LATIFPOUR,Mohammad KHEYRANDISH,Mahdi MOSLEH,Najmeh HOSSEINPOUR

Journal Article

Level-direction decomposition analysis with a focus on image watermarking framework

M. F. KAZEMI,M. A. POURMINA,A. H. MAZINAN

Journal Article

On the role of optimization algorithms in ownership-preserving data mining

Muhammad KAMRAN, Ehsan Ullah MUNIR

Journal Article

Ablock-based secure and robustwatermarking scheme for color images based onmulti-resolution decomposition and de-correlation

Muhammad IMRAN, Bruce A. HARVEY, Muhammad ATIF, Adnan Ali MEMON

Journal Article

Satellite Internet of Things: challenges, solutions, and development trends

Xiaoming CHEN, Zhaobin XU, Lin SHANG,chen_xiaoming@zju.edu.cn,zjuxzb@zju.edu.cn,shangl@microsate.com

Journal Article

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Journal Article