- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Advanced Data Compression Techniques
- Advanced Wireless Communication Techniques
- Cellular Automata and Applications
- Wireless Communication Networks Research
- Advanced MIMO Systems Optimization
- PAPR reduction in OFDM
- Image and Signal Denoising Methods
- Biometric Identification and Security
- Cryptography and Data Security
- Antenna Design and Analysis
- Cryptographic Implementations and Security
- Cooperative Communication and Network Coding
- Image Enhancement Techniques
- Microwave Engineering and Waveguides
- Graphene research and applications
- COVID-19 diagnosis using AI
- Millimeter-Wave Propagation and Modeling
- Full-Duplex Wireless Communications
- Advanced Neural Network Applications
- ECG Monitoring and Analysis
- Advanced Image Fusion Techniques
- Advanced Wireless Network Optimization
University of Kashmir
2015-2024
This paper presents a chaotic encryption-based blind digital image watermarking technique applicable to both grayscale and color images. Discrete cosine transform (DCT) is used before embedding the watermark in host image. The divided into 8 × nonoverlapping blocks prior DCT application, bit embedded by modifying difference between coefficients of adjacent blocks. Arnold addition encryption add double-layer security watermark. Three different variants proposed algorithm have been tested...
Internet of Medical Things (IoMT)-driven smart health and emotional care is revolutionizing the healthcare industry by embracing several technologies related to multimodal physiological data collection, communication, intelligent automation, efficient manufacturing. The authentication secure exchange electronic records (EHRs), comprising patient collected using wearable sensors laboratory investigations, paramount importance. In this article, we present a novel high payload reversible EHR...
Abstract With the advent of state art nature-inspired pure attention based models i.e. transformers, and their success in natural language processing (NLP), extension to machine vision (MV) tasks was inevitable much felt. Subsequently, transformers (ViTs) were introduced which are giving quite a challenge established deep learning techniques. However, models/architectures like require huge data, large training times computational resources. Some recent works suggest that combinations these...
The image data received through various sensors are of significant importance in Industry 4.0. Unfortunately, these highly vulnerable to malicious attacks during its transit the destination. Although use pervasive edge computing (PEC) with Internet Things (IoT) has solved issues, such as latency, proximity, and real-time processing, but security authentication between nodes is still a concern PEC-based industrial-IoT scenarios. In this article, we present "DWFCAT," dual watermarking...