Page 90 - IJEEE-2023-Vol19-ISSUE-1
P. 90
86 | Hussein, Muhajjar, & Mahdi
[8] K. Chitra and V. Prasanna, “A Dynamic Security Model
for Visual Cryptography and Digital Watermarking,”
Proceeding of the International Conference on Computer
Networks, Big Data and IoT (ICCBI - 2018), pp 351–357,
2018.
[9] M. A. Ayu, T. Mantoro, and I. M. A. Priyatna,
“Advanced watermarking technique to improve medical
images’ security,” Telkomnika (Telecommunication
Computing Electronics and Control), vol. 17, no. 5. pp.
2684–2696, 2019. doi: 10.12928/TELKOMNIKA.v17i5.
13292.
[10] E. Gul and S. Ozturk, “A novel hash function based
fragile watermarking method for image integrity,”
Multimedia Tools and Applications, vol. 78, no. 13. pp.
17701–17718, 2019. doi: 10.1007/s11042-018-7084-0.
[11] R. Sinhal, I. A. Ansari, and C. W. Ahn, “Blind Image
Watermarking for Localization and Restoration of Color
Images,” IEEE Access, vol. 8, pp. 200157–200169, 2020.
doi: 10.1109/ACCESS.2020.3035428.
[12] R. Reyes-Reyes, C. Cruz-Ramos, V. Ponomaryov, B. P.
Garcia-Salgado, and J. Molina-Garcia, “Color image self-
recovery and tampering detection scheme based on fragile
watermarking with high recovery capability,” Applied
Sciences (Switzerland), vol. 11, no. 7. 2021. doi:
10.3390/app11073187.
[13] G. D. Su, C. C. Chang, and C. C. Chen, “A hybrid-
Sudoku based fragile watermarking scheme for image
tampering detection,” Multimedia Tools and Applications,
vol. 80, no. 8. pp. 12881–12903, 2021. doi:
10.1007/s11042-020-10451-1.
[14] S. A. Alsuhibany, “Developing a Visual Cryptography
Tool for Arabic Text,” IEEE Access, vol. 7, pp. 76573–
76579, 2019. doi: 10.1109/ACCESS.2019.2920858.
[15] S. A. Fadhil, A. K. Farhan, and A. H. Radie, “Visual
Cryptography Techniques: Short Survey,” 4th Int. Iraqi
Conf. Eng. Technol. Their Appl. IICETA 2021, pp. 276–
282, 2021, doi: 10.1109/IICETA51758.2021.9717352.
[16] N. Hamed and A. Yassin, “Secure Patient
Authentication Scheme in the Healthcare System Using
Symmetric Encryption,” Iraqi Journal for Electrical and
Electronic Engineering, vol. 18, no. 1. pp. 71–81, 2022. doi:
10.37917/ijeee.18.1.9.
[17] O. Evsutin, A. Melman, and R. Meshcheryakov,
“Digital steganography and watermarking for digital
images: A review of current research directions,” IEEE
Access, vol. 8. pp. 166589–166611, 2020. doi:
10.1109/ACCESS.2020.3022779.
[18] L. Rakhmawati, Wirawan, and Suwadi, “Image Fragile
Watermarking with Two Authentication Components for
Tamper Detection and Recovery,” 2018 Int. Conf. Intell.
Auton. Syst. ICoIAS 2018, pp. 35–38, 2018. doi:
10.1109/ICoIAS.2018.8494080.
[19] https://www.kaggle.com/datasets/pavansanagapati/
images-dataset