Compressed and raw video steganography techniques: a comprehensive survey and analysis

RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2017 - Springer
In the last two decades, the science of covertly concealing and communicating data has
acquired tremendous significance due to the technological advancement in communication …

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy

C Qin, P Ji, X Zhang, J Dong, J Wang - Signal processing, 2017 - Elsevier
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlapping embedding strategy. The block-wise mechanism for …

Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

D Singh, SK Singh - Journal of Visual Communication and Image …, 2016 - Elsevier
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …

DCT based efficient fragile watermarking scheme for image authentication and restoration

D Singh, SK Singh - Multimedia Tools and Applications, 2017 - Springer
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …

A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes

RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2016 - Springer
Due to the significant growth of video data over the Internet, video steganography has
become a popular choice. The effectiveness of any steganographic algorithm depends on …

Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery

C Qin, P Ji, CC Chang, J Dong, X Sun - IEEE MultiMedia, 2018 - ieeexplore.ieee.org
Self-embedding watermarking can be used for image tampering recovery. In this work, the
authors proposed a new image self-embedding scheme based on optimal iterative block …

Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism

C Qin, CC Chang, PY Chen - Signal Processing, 2012 - Elsevier
In this paper, we propose a novel fragile watermarking scheme with content restoration
capability. Authentication-bits are produced using the image hashing method with a folding …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …

DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network

G Zhao, C Qin, H Yao, Y Han - Pattern Recognition Letters, 2022 - Elsevier
In recent years, a large number of deep neural networks (DNN) models have been built and
deployed, which need to be protected against malicious tampering by the adversary. This …

[HTML][HTML] Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic

M Jana, B Jana, S Joardar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The aim of designing self-embedding fragile watermarking is copy-right protection, tamper
localization and image recovery. This paper proposes a self-embedding fragile …