Have a personal or library account? Click to login
Security Features on and with Documents: A Survey Cover
By: C. Yamini and  N. Priya  
Open Access
|Sep 2024

References

  1. Koptyra, K. and Ogiela, M.R. (2021). ‘Imagechain—Application of blockchain technology for images. Sensors, 21(1), 82. Available at: https://doi.org/10.3390/s21010082.
  2. Satish, A., Vara Prasad, E., Tejasvi, R., Swapna, P. and Vijayarajan, R. (2019). ‘Image Scrambling through Two level Arnold Transform’. Alliance International Conference on Artificial Intelligence and Machine Learning (AICAAM), 2019.
  3. Zhou, Y., Cao, W. and Chen, C.L.P. (2014). ‘Image encryption using binary bitplane’. Signal Processing, 100, 197–207. Available at: http://dx.doi.org/10.1016/j.sigpro.2014.01.020.
  4. Modak, P.M. and Pawar, V. (2015). ‘A comprehensive survey on image scrambling techniques. International Journal of Science and Research (IJSR), 2015, 813–818.
  5. Frattolillo, F. (2020). ‘A watermarking protocol based on blockchain’. Application Sciences, 10(21), 7746. Available at: https://doi.org/10.3390/app10217746.
  6. Mannepalli, P.K., Richhariya, V., Gupta, S.K., Shukla, P.K. and Dutta, P.K. (2021). ‘Block chain based robust image watermarking using edge detection and wavelet transform’. IEEE Access, 9, 2021. Available at: http://dx.doi.org/10.21203/rs.3.rs-766105/v1.
  7. Ren, N., Zhao, Y., Zhu, C., Zhou, Q. and Xu, D. (2021). ‘Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps’. International Journal of Geo-Information, 10, 294. Available at: https://doi.org/10.3390/ijgi10050294.
  8. Abrar, A., Abdul, W. and Ghouzali, S. (2021). ‘Secure Image Authentication Using Watermarking and Blockchain’. Intelligent Automation & Soft Computing, 2021, 577–591. Available at: http://dx.doi.org/10.32604/iasc.2021.016382.
  9. Evsutin, O. and Meshcheryakov, Y. (2020). ‘The Use of the Blockchain Technology and Digital Watermarking to Provide Data Authenticity on a Mining Enterprise’. Sensors, 20, 3443. Available at: http://dx.doi.org/10.3390/s20123443.
  10. Mishra, P. and Suhag, R. (2022). ‘State-Finances: A Study of Budgets, RBI; PRS, “LAND RECORDS AND TITLES IN INDIA”’. Available at: https://prsindia.org.
  11. Banik, A., Shamsi, Z. and Laiphrakpam, D.S. (2022). ‘An encryption scheme for securing multiple medical images. ScienceDirect, 2022. Available at: https://doi.org/10.1016/j.jisa.2019.102398.
  12. Meng, Z., Morizumi, T., Miyata, S. and Kinoshita, H. (2018). ‘Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain’. 2018 IEEE COMPSAC, 2018. Available at: http://dx.doi.org/10.1109/COMPSAC.2018.10258.
  13. Chithra, P.L. and Aparna, R. (2023). ‘Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme’. International Journal of Information and Computer Security, 21, 185–204. Available at: https://doi.org/10.1504/IJICS.2023.131100.
  14. Nasr, M.A., El-Shafai, W., Abdel-Salam, N., El-Rabaie, E.S.M., El-Fishawy, A.S. and Abd El-Samie, F.E. (2023). ‘Efficient information hiding in medical optical images based on piecewise linear chaotic maps. Journal of Optics, 2023, 1852–1866. Available at: https://doi.org/10.1007/s12596-023-01128-7.
  15. Megías, D., Mazurczyk, W. and Kuribayashi, M. (2021). ‘Data Hiding and Its Applications: Digital Watermarking and Steganography’. Applied Sciences, 11(22), 10928. Available at: https://doi.org/10.3390/app112210928.
  16. Li, M., Zeng, L., Zhao, L., Yang, R., An, D. and Fan, H. (2021). ‘Blockchain-Watermarking for Compressive Sensed Images’. IEEE Access, 9, 2021. Available at: http://dx.doi.org/10.1109/ACCESS.2021.3072196.
  17. Brabin, D., Ananth, C. and Bojjagani, S. (2022). ‘Blockchain based security framework for sharing digital images using reversible data hiding and encryption’. Multimedia Tools and Applications, 81, Springer, 24721–24738. Available at: https://doi.org/10.1007/s11042-022-12617-5.
  18. Kumari, M., Gupta, S. and Sardana, P. (2017). ‘A survey of image encryption algorithms. 3D Research, 37, 2017. Available at: https://ui.adsabs.harvard.edu/link_gateway/2017TDR.....8..148K/doi:10.1007/s13319-017-0148-5.
  19. Kaur, M. and Kumar, V. (2020). ‘A Comprehensive Review on Image Encryption Techniques’. Arch Computat Methods Eng, 27, Springer, 15–43. Available at: https://doi.org/10.1007/s11831-018-9298-8.
DOI: https://doi.org/10.2478/ias-2024-0006 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 72 - 79
Published on: Sep 23, 2024
Published by: Cerebration Science Publishing Co., Limited
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2024 C. Yamini, N. Priya, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.