Compressed and raw video steganography techniques: a comprehensive survey and analysis
RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2017 - Springer
In the last two decades, the science of covertly concealing and communicating data has
acquired tremendous significance due to the technological advancement in communication …
acquired tremendous significance due to the technological advancement in communication …
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlapping embedding strategy. The block-wise mechanism for …
capability based on overlapping embedding strategy. The block-wise mechanism for …
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
DCT based efficient fragile watermarking scheme for image authentication and restoration
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …
restoration are very essential, especially when it is utilized in forensic science, medical …
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
RJ Mstafa, KM Elleithy - Multimedia Tools and Applications, 2016 - Springer
Due to the significant growth of video data over the Internet, video steganography has
become a popular choice. The effectiveness of any steganographic algorithm depends on …
become a popular choice. The effectiveness of any steganographic algorithm depends on …
Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery
Self-embedding watermarking can be used for image tampering recovery. In this work, the
authors proposed a new image self-embedding scheme based on optimal iterative block …
authors proposed a new image self-embedding scheme based on optimal iterative block …
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
In this paper, we propose a novel fragile watermarking scheme with content restoration
capability. Authentication-bits are produced using the image hashing method with a folding …
capability. Authentication-bits are produced using the image hashing method with a folding …
Fragile watermarking schemes for image authentication: a survey
K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …
proposed in the past decade. The limited embedding capacity and extent of tampering are …
DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network
In recent years, a large number of deep neural networks (DNN) models have been built and
deployed, which need to be protected against malicious tampering by the adversary. This …
deployed, which need to be protected against malicious tampering by the adversary. This …
[HTML][HTML] Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic
M Jana, B Jana, S Joardar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The aim of designing self-embedding fragile watermarking is copy-right protection, tamper
localization and image recovery. This paper proposes a self-embedding fragile …
localization and image recovery. This paper proposes a self-embedding fragile …