2014 IEEE International Conference on Computational Intelligence and Computing Research 2014
DOI: 10.1109/iccic.2014.7238504
|View full text |Cite
|
Sign up to set email alerts
|

A review on methods for image authentication and visual cryptography in digital image watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Trust-related issues. Despite the perceived strength of cryptocurrency security, concerns about trust persist among users due to the fully digital nature of these currencies without any physical presence (Vyas and Lunagaria, 2014). The security and privacy of cryptocurrency, for instance, were evaluated by Bushager et al (2018), who identified selfinduced events, malicious events, hardware failure and software failure as the most common causes of cryptocurrency key loss.…”
Section: Cryptocurrency and Its Barriermentioning
confidence: 99%
See 1 more Smart Citation
“…Trust-related issues. Despite the perceived strength of cryptocurrency security, concerns about trust persist among users due to the fully digital nature of these currencies without any physical presence (Vyas and Lunagaria, 2014). The security and privacy of cryptocurrency, for instance, were evaluated by Bushager et al (2018), who identified selfinduced events, malicious events, hardware failure and software failure as the most common causes of cryptocurrency key loss.…”
Section: Cryptocurrency and Its Barriermentioning
confidence: 99%
“…According to Quamara and Singh (2022), even though Bitcoin is one of the latest cryptocurrencies, it is still accompanied by a wide range of security concerns, and finding solutions to them has become an important topic of research. In this context, Vyas and Lunagaria (2014) provided research on Bitcoin security difficulties and concerns, with a focus on characteristics connected to the mining and transaction processes. According to a Coinbase poll, 56% of respondents have personal experience or knowledge of someone being a victim of a cryptocurrency scam, with a median loss of $2,000 among those impacted (Biswas, 2023).…”
Section: Cryptocurrency and Its Barriermentioning
confidence: 99%
“…Digital watermarking with visual cryptography mechanisms was also carried out [16]. A visual cryptography approach for copyright security in watermarking was presented by Tijedjadjine et al [17].…”
Section: Related Workmentioning
confidence: 99%
“…Because Chapter 1: Introduction of this mechanism, some colluding users may want to work with each other as a mining pool to acquire more than 50% of the computing power. In this case, they can modify, exclude, or reverse the transactions to double-spend or prevent other miners from mining any valid block and, consequently, earn the most awards in the network [37]. This attack is known as the most harmful attack since it gives the power to the attacker to destroy the whole network's stability.…”
Section: Security Threatsmentioning
confidence: 99%