A review of compressive sensing in information security field

Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He - IEEE access, 2016 - ieeexplore.ieee.org
The applications of compressive sensing (CS) in the field of information security have
captured a great deal of researchers' attention in the past decade. To supply guidance for …

Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

D Singh, SK Singh - Journal of Visual Communication and Image …, 2016 - Elsevier
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …

Outsourcing large matrix inversion computation to a public cloud

X Lei, X Liao, T Huang, H Li… - IEEE Transactions on cloud …, 2013 - ieeexplore.ieee.org
Cloud computing enables resource-constrained clients to economically outsource their huge
computation workloads to a cloud server with massive computational power. This promising …

DCT based efficient fragile watermarking scheme for image authentication and restoration

D Singh, SK Singh - Multimedia Tools and Applications, 2017 - Springer
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …

An effective SVD-based image tampering detection and self-recovery using active watermarking

S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien… - Signal Processing …, 2014 - Elsevier
In this paper, an effective tamper detection and self-recovery algorithm based on singular
value decomposition (SVD) is proposed. This method generates two distinct tamper …

Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery

C Qin, P Ji, CC Chang, J Dong, X Sun - IEEE MultiMedia, 2018 - ieeexplore.ieee.org
Self-embedding watermarking can be used for image tampering recovery. In this work, the
authors proposed a new image self-embedding scheme based on optimal iterative block …

A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT

Y Zhang, Q He, G Chen, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In the presence of several critical issues during data acquisition in industrial-informatics-
based applications, like Internet of Things (IoT) and smart grid, this article proposes a novel …

A survey on reversible watermarking for multimedia content: A robustness overview

A Menendez-Ortiz, C Feregrino-Uribe… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the growth of the Internet along with multimedia data delivery, have caused
the misuse and even alteration of the original digital content. As a security mechanism …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …