References
- Koptyra, K. and Ogiela, M.R. (2021). ‘Imagechain—Application of blockchain technology for images. Sensors, 21(1), 82. Available at:
https://doi.org/10.3390/s21010082 . - Satish, A., Vara Prasad, E., Tejasvi, R., Swapna, P. and Vijayarajan, R. (2019). ‘Image Scrambling through Two level Arnold Transform’. Alliance International Conference on Artificial Intelligence and Machine Learning (AICAAM), 2019.
- Zhou, Y., Cao, W. and Chen, C.L.P. (2014). ‘Image encryption using binary bitplane’. Signal Processing, 100, 197–207. Available at:
http://dx.doi.org/10.1016/j.sigpro.2014.01.020 . - Modak, P.M. and Pawar, V. (2015). ‘A comprehensive survey on image scrambling techniques. International Journal of Science and Research (IJSR), 2015, 813–818.
- Frattolillo, F. (2020). ‘A watermarking protocol based on blockchain’. Application Sciences, 10(21), 7746. Available at:
https://doi.org/10.3390/app10217746 . - Mannepalli, P.K., Richhariya, V., Gupta, S.K., Shukla, P.K. and Dutta, P.K. (2021). ‘Block chain based robust image watermarking using edge detection and wavelet transform’. IEEE Access, 9, 2021. Available at:
http://dx.doi.org/10.21203/rs.3.rs-766105/v1 . - Ren, N., Zhao, Y., Zhu, C., Zhou, Q. and Xu, D. (2021). ‘Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps’. International Journal of Geo-Information, 10, 294. Available at:
https://doi.org/10.3390/ijgi10050294 . - Abrar, A., Abdul, W. and Ghouzali, S. (2021). ‘Secure Image Authentication Using Watermarking and Blockchain’. Intelligent Automation & Soft Computing, 2021, 577–591. Available at:
http://dx.doi.org/10.32604/iasc.2021.016382 . - Evsutin, O. and Meshcheryakov, Y. (2020). ‘The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticity on a Mining Enterprise’. Sensors, 20, 3443. Available at:
http://dx.doi.org/10.3390/s20123443 . - Mishra, P. and Suhag, R. (2022). ‘State-Finances: A Study of Budgets, RBI; PRS, “LAND RECORDS AND TITLES IN INDIA”’. Available at:
https://prsindia.org . - Banik, A., Shamsi, Z. and Laiphrakpam, D.S. (2022). ‘An encryption scheme for securing multiple medical images. ScienceDirect, 2022. Available at:
https://doi.org/10.1016/j.jisa.2019.102398 . - Meng, Z., Morizumi, T., Miyata, S. and Kinoshita, H. (2018). ‘Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain’. 2018 IEEE COMPSAC, 2018. Available at:
http://dx.doi.org/10.1109/COMPSAC.2018.10258 . - Chithra, P.L. and Aparna, R. (2023). ‘Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme’. International Journal of Information and Computer Security, 21, 185–204. Available at:
https://doi.org/10.1504/IJICS.2023.131100 . - Nasr, M.A., El-Shafai, W., Abdel-Salam, N., El-Rabaie, E.S.M., El-Fishawy, A.S. and Abd El-Samie, F.E. (2023). ‘Efficient information hiding in medical optical images based on piecewise linear chaotic maps. Journal of Optics, 2023, 1852–1866. Available at:
https://doi.org/10.1007/s12596-023-01128-7 . - Megías, D., Mazurczyk, W. and Kuribayashi, M. (2021). ‘Data Hiding and Its Applications: Digital Watermarking and Steganography’. Applied Sciences, 11(22), 10928. Available at:
https://doi.org/10.3390/app112210928 . - Li, M., Zeng, L., Zhao, L., Yang, R., An, D. and Fan, H. (2021). ‘Blockchain-Watermarking for Compressive Sensed Images’. IEEE Access, 9, 2021. Available at:
http://dx.doi.org/10.1109/ACCESS.2021.3072196 . - Brabin, D., Ananth, C. and Bojjagani, S. (2022). ‘Blockchain based security framework for sharing digital images using reversible data hiding and encryption’. Multimedia Tools and Applications, 81, Springer, 24721–24738. Available at:
https://doi.org/10.1007/s11042-022-12617-5 . - Kumari, M., Gupta, S. and Sardana, P. (2017). ‘A survey of image encryption algorithms. 3D Research, 37, 2017. Available at:
https://ui.adsabs.harvard.edu/link_gateway/2017TDR.....8..148K/doi:10.1007/s13319-017-0148-5 . - Kaur, M. and Kumar, V. (2020). ‘A Comprehensive Review on Image Encryption Techniques’. Arch Computat Methods Eng, 27, Springer, 15–43. Available at:
https://doi.org/10.1007/s11831-018-9298-8 .