A review of compressive sensing in information security field
The applications of compressive sensing (CS) in the field of information security have
captured a great deal of researchers' attention in the past decade. To supply guidance for …
captured a great deal of researchers' attention in the past decade. To supply guidance for …
Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
Outsourcing large matrix inversion computation to a public cloud
Cloud computing enables resource-constrained clients to economically outsource their huge
computation workloads to a cloud server with massive computational power. This promising …
computation workloads to a cloud server with massive computational power. This promising …
DCT based efficient fragile watermarking scheme for image authentication and restoration
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …
restoration are very essential, especially when it is utilized in forensic science, medical …
An effective SVD-based image tampering detection and self-recovery using active watermarking
In this paper, an effective tamper detection and self-recovery algorithm based on singular
value decomposition (SVD) is proposed. This method generates two distinct tamper …
value decomposition (SVD) is proposed. This method generates two distinct tamper …
Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery
Self-embedding watermarking can be used for image tampering recovery. In this work, the
authors proposed a new image self-embedding scheme based on optimal iterative block …
authors proposed a new image self-embedding scheme based on optimal iterative block …
A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT
In the presence of several critical issues during data acquisition in industrial-informatics-
based applications, like Internet of Things (IoT) and smart grid, this article proposes a novel …
based applications, like Internet of Things (IoT) and smart grid, this article proposes a novel …
A survey on reversible watermarking for multimedia content: A robustness overview
A Menendez-Ortiz, C Feregrino-Uribe… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the growth of the Internet along with multimedia data delivery, have caused
the misuse and even alteration of the original digital content. As a security mechanism …
the misuse and even alteration of the original digital content. As a security mechanism …
Fragile watermarking schemes for image authentication: a survey
K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …
proposed in the past decade. The limited embedding capacity and extent of tampering are …