{"id":"https://openalex.org/W7125102102","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331506","title":"Reliable Digital Image Authentication Using DNPLSB based Watermarking for Tamper Detection in Facial Images","display_name":"Reliable Digital Image Authentication Using DNPLSB based Watermarking for Tamper Detection in Facial Images","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7125102102","doi":"https://doi.org/10.1109/cloudcom67567.2025.11331506"},"language":null,"primary_location":{"id":"doi:10.1109/cloudcom67567.2025.11331506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331506","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123459349","display_name":"Rupa Chiramdasu","orcid":null},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rupa Chiramdasu","raw_affiliation_strings":["Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India"],"affiliations":[{"raw_affiliation_string":"Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123501148","display_name":"B Akshitha Yadav","orcid":null},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B Akshitha Yadav","raw_affiliation_strings":["Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India"],"affiliations":[{"raw_affiliation_string":"Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123453692","display_name":"K Sushmasri","orcid":null},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K Sushmasri","raw_affiliation_strings":["Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India"],"affiliations":[{"raw_affiliation_string":"Siddhartha Academy of Higher Education Deemed to be University,Vijayawada,A.P,India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123479448","display_name":"Gautam Srivastava","orcid":null},"institutions":[{"id":"https://openalex.org/I48890080","display_name":"Brandon University","ror":"https://ror.org/02qp25a50","country_code":"CA","type":"education","lineage":["https://openalex.org/I48890080"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gautam Srivastava","raw_affiliation_strings":["Brandon University,Department of Mathematics and Computer Science,Manitoba,Canada"],"affiliations":[{"raw_affiliation_string":"Brandon University,Department of Mathematics and Computer Science,Manitoba,Canada","institution_ids":["https://openalex.org/I48890080"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041854978","display_name":"Thippa Reddy Gadekallu","orcid":null},"institutions":[{"id":"https://openalex.org/I1284762954","display_name":"Zhejiang A & F University","ror":"https://ror.org/02vj4rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I1284762954"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Thippa Reddy Gadekallu","raw_affiliation_strings":["College of Mathematics and Computer Science, Zhejiang A&#x0026;F University,Hangzhou,China,311300"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Zhejiang A&#x0026;F University,Hangzhou,China,311300","institution_ids":["https://openalex.org/I1284762954"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123459349"],"corresponding_institution_ids":["https://openalex.org/I116891498"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.70406932,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.7886999845504761,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.7886999845504761,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.11829999834299088,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.02370000071823597,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7657999992370605},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5893999934196472},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.585099995136261},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5040000081062317},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5029000043869019},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.45809999108314514},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.37560001015663147},{"id":"https://openalex.org/keywords/digital-watermarking-alliance","display_name":"Digital Watermarking Alliance","score":0.3474000096321106},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.3314000070095062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7918999791145325},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7657999992370605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6449000239372253},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5893999934196472},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.585099995136261},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5040000081062317},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5029000043869019},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.49549999833106995},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.45809999108314514},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.37560001015663147},{"id":"https://openalex.org/C193470923","wikidata":"https://www.wikidata.org/wiki/Q5276026","display_name":"Digital Watermarking Alliance","level":4,"score":0.3474000096321106},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.3314000070095062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3303999900817871},{"id":"https://openalex.org/C19163912","wikidata":"https://www.wikidata.org/wiki/Q7681779","display_name":"Tamper resistance","level":2,"score":0.328000009059906},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.323199987411499},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2840000092983246},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.27410000562667847},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.26989999413490295},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.26109999418258667},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudcom67567.2025.11331506","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom67567.2025.11331506","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4195711314678192,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1993389271","https://openalex.org/W2511265493","https://openalex.org/W2545788951","https://openalex.org/W2553095340","https://openalex.org/W2769905613","https://openalex.org/W2800754358","https://openalex.org/W2982215948","https://openalex.org/W3042950035","https://openalex.org/W3100231621","https://openalex.org/W3135872251","https://openalex.org/W3185788529","https://openalex.org/W3215512032","https://openalex.org/W4315865166","https://openalex.org/W4364856339","https://openalex.org/W4381848671","https://openalex.org/W4386847724","https://openalex.org/W4388818714","https://openalex.org/W4390886780","https://openalex.org/W4396220356","https://openalex.org/W4400111527","https://openalex.org/W4400771884","https://openalex.org/W4401871040","https://openalex.org/W4405908480","https://openalex.org/W4409512023","https://openalex.org/W4409512263","https://openalex.org/W4409513158","https://openalex.org/W4409513226"],"related_works":[],"abstract_inverted_index":{"The":[0,93,155],"increasing":[1],"growth":[2],"of":[3,12,33,68,95,195],"digital":[4,52,143],"images":[5,145],"has":[6,39],"become":[7],"significant":[8],"in":[9,44,161,177,183,190],"the":[10,30,66,196],"areas":[11],"healthcare,":[13],"real-time":[14,45],"governance,":[15],"and":[16,36,90,105,133,153,170,185,199,204],"social":[17],"media":[18],"activities":[19,148],"to":[20,23,41,61,71,141,202],"validate":[21],"identity":[22],"offer":[24],"services":[25],"without":[26],"any":[27],"inconvenience.":[28],"However,":[29],"rapid":[31],"advancement":[32],"artificial":[34],"intelligence":[35],"security-related":[37],"concepts":[38],"led":[40],"an":[42],"increase":[43,176],"security":[46],"attacks,":[47],"such":[48,83,149],"as":[49,84,150],"deepfakes":[50],"on":[51],"images.":[53],"Advanced":[54],"technologies":[55],"have":[56,76],"been":[57],"used":[58],"by":[59],"attackers":[60],"exploit":[62],"sensitive":[63],"data,":[64],"necessitating":[65],"proposal":[67],"novel":[69,119],"approaches":[70],"counter":[72],"them.":[73],"Numerous":[74],"studies":[75],"evaluated":[77],"tamper":[78,111],"detection":[79,112],"using":[80],"watermarking":[81,120],"techniques":[82,98],"LSB,":[85],"DCT,":[86,167],"DWT,":[87],"correlation-based":[88],"methods,":[89],"hybrid":[91],"approaches.":[92],"drawbacks":[94],"these":[96,116],"existing":[97,159],"include":[99],"low":[100],"embedding":[101],"density,":[102],"memory":[103],"inefficiency,":[104],"insufficient":[106],"integrity":[107],"checks,":[108],"which":[109],"impact":[110],"efficiency.":[113],"To":[114],"address":[115],"limitations,":[117],"a":[118,126,134,173,179,186],"technique":[121],"is":[122],"proposed":[123,156],"that":[124],"uses":[125],"Multi-task":[127],"Cascaded":[128],"Convolutional":[129],"Neural":[130],"Network":[131],"(MTCNN)":[132],"Penultimate":[135],"Least":[136],"Significant":[137],"Bit":[138],"(PLSB)":[139],"approach":[140],"secure":[142],"human":[144],"against":[146],"unlawful":[147],"deep":[151],"fakes":[152],"tampering.":[154,205],"framework":[157],"outperforms":[158],"methodologies":[160],"key":[162],"performance":[163],"metrics,":[164],"including":[165],"SVD-DWT,":[166],"DNN,":[168],"PB-DMFB,":[169],"PCA-DCT,":[171],"achieving":[172],"2":[174],"%":[175,181,188],"SSIM,":[178],"12":[180],"enhancement":[182],"PSNR,":[184],"4":[187],"reduction":[189],"MSE,":[191],"indicating":[192],"superior":[193],"quality":[194],"watermarked":[197],"image":[198],"enhanced":[200],"resistance":[201],"manipulation":[203]},"counts_by_year":[],"updated_date":"2026-01-22T23:33:04.759266","created_date":"2026-01-22T00:00:00"}
