Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bin Faheem, Zaid | - |
dc.contributor.author | Hanif, Danial | - |
dc.contributor.author | Arslan, Farrukh | - |
dc.contributor.author | Ali, Mubashir | - |
dc.contributor.author | Hussain, Aamir | - |
dc.contributor.author | Ali, Jehad | - |
dc.contributor.author | Baz, Abdullah | - |
dc.date.issued | 2023-11-01 | - |
dc.identifier.issn | 0045-7906 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/33709 | - |
dc.description.abstract | In the contemporary era, data holds a vital significance, and ensuring the security of data stands as an exceptionally challenging endeavor. Both industry and academia dedicate substantial efforts to mitigate security breaches. Given the evolving nature of modern cyber threats, there arises a compelling necessity for robust cybersecurity measures concerning digital content. We propose the merits of digital watermarking within the realm of cybersecurity for digital content. Researchers within the watermarking domain are diligently striving to offer the utmost security services. Unfortunately, achieving both robustness and security concurrently within these techniques has proven to be a formidable task. Hence, we delve into a novel approach for image watermarking, which draws inspiration from gradient-based methodologies. This scheme hinges upon compass edge detection, the least significant bit mechanism, and the utilization of chaotic encryption for watermark embedding. The effectiveness and performance are rigorously evaluated against a spectrum of geometrical and image-processing attacks. | - |
dc.description.sponsorship | The authors extend their appreciation to the Deanship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number: IFP22UQU4260426DSR172 | - |
dc.language.iso | eng | - |
dc.publisher | Elsevier Ltd | - |
dc.subject.mesh | Chaotic encryptions | - |
dc.subject.mesh | Cyber security | - |
dc.subject.mesh | Cyber threats | - |
dc.subject.mesh | Digital contents | - |
dc.subject.mesh | Edge detectors | - |
dc.subject.mesh | Gradient based | - |
dc.subject.mesh | Least significant bits | - |
dc.subject.mesh | Security breaches | - |
dc.subject.mesh | Security services | - |
dc.subject.mesh | Substitution box | - |
dc.title | An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity | - |
dc.type | Article | - |
dc.citation.title | Computers and Electrical Engineering | - |
dc.citation.volume | 111 | - |
dc.identifier.bibliographicCitation | Computers and Electrical Engineering, Vol.111 | - |
dc.identifier.doi | 10.1016/j.compeleceng.2023.108979 | - |
dc.identifier.scopusid | 2-s2.0-85173208983 | - |
dc.identifier.url | https://www.journals.elsevier.com/computers-and-electrical-engineering | - |
dc.subject.keyword | Cybersecurity | - |
dc.subject.keyword | Image watermarking | - |
dc.subject.keyword | Least significant bit | - |
dc.subject.keyword | Substitution box | - |
dc.description.isoa | false | - |
dc.subject.subarea | Control and Systems Engineering | - |
dc.subject.subarea | Computer Science (all) | - |
dc.subject.subarea | Electrical and Electronic Engineering | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.