Page 90 - IJEEE-2023-Vol19-ISSUE-1
P. 90

86 |                                                            Hussein, Muhajjar, & Mahdi

[8] K. Chitra and V. Prasanna, “A Dynamic Security Model
 for Visual Cryptography and Digital Watermarking,”
 Proceeding of the International Conference on Computer
 Networks, Big Data and IoT (ICCBI - 2018), pp 351–357,
 2018.
[9] M. A. Ayu, T. Mantoro, and I. M. A. Priyatna,
 “Advanced watermarking technique to improve medical
 images’ security,” Telkomnika (Telecommunication
 Computing Electronics and Control), vol. 17, no. 5. pp.
 2684–2696, 2019. doi: 10.12928/TELKOMNIKA.v17i5.
 13292.
[10] E. Gul and S. Ozturk, “A novel hash function based
 fragile watermarking method for image integrity,”
 Multimedia Tools and Applications, vol. 78, no. 13. pp.
 17701–17718, 2019. doi: 10.1007/s11042-018-7084-0.
[11] R. Sinhal, I. A. Ansari, and C. W. Ahn, “Blind Image
 Watermarking for Localization and Restoration of Color
 Images,” IEEE Access, vol. 8, pp. 200157–200169, 2020.
 doi: 10.1109/ACCESS.2020.3035428.
[12] R. Reyes-Reyes, C. Cruz-Ramos, V. Ponomaryov, B. P.
 Garcia-Salgado, and J. Molina-Garcia, “Color image self-
 recovery and tampering detection scheme based on fragile
 watermarking with high recovery capability,” Applied
 Sciences (Switzerland), vol. 11, no. 7. 2021. doi:
 10.3390/app11073187.
[13] G. D. Su, C. C. Chang, and C. C. Chen, “A hybrid-
 Sudoku based fragile watermarking scheme for image
 tampering detection,” Multimedia Tools and Applications,
 vol. 80, no. 8. pp. 12881–12903, 2021. doi:
 10.1007/s11042-020-10451-1.
[14] S. A. Alsuhibany, “Developing a Visual Cryptography
 Tool for Arabic Text,” IEEE Access, vol. 7, pp. 76573–
 76579, 2019. doi: 10.1109/ACCESS.2019.2920858.
[15] S. A. Fadhil, A. K. Farhan, and A. H. Radie, “Visual
 Cryptography Techniques: Short Survey,” 4th Int. Iraqi
 Conf. Eng. Technol. Their Appl. IICETA 2021, pp. 276–
 282, 2021, doi: 10.1109/IICETA51758.2021.9717352.
[16] N. Hamed and A. Yassin, “Secure Patient
 Authentication Scheme in the Healthcare System Using
 Symmetric Encryption,” Iraqi Journal for Electrical and
 Electronic Engineering, vol. 18, no. 1. pp. 71–81, 2022. doi:
 10.37917/ijeee.18.1.9.
[17] O. Evsutin, A. Melman, and R. Meshcheryakov,
 “Digital steganography and watermarking for digital
 images: A review of current research directions,” IEEE
 Access, vol. 8. pp. 166589–166611, 2020. doi:
 10.1109/ACCESS.2020.3022779.
[18] L. Rakhmawati, Wirawan, and Suwadi, “Image Fragile
 Watermarking with Two Authentication Components for
 Tamper Detection and Recovery,” 2018 Int. Conf. Intell.
 Auton. Syst. ICoIAS 2018, pp. 35–38, 2018. doi:
 10.1109/ICoIAS.2018.8494080.
[19] https://www.kaggle.com/datasets/pavansanagapati/
 images-dataset
   85   86   87   88   89   90   91   92   93   94   95