Digital image watermarking techniques: a review
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …
An overview of digital video watermarking
M Asikuzzaman, MR Pickering - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …
Ringid: Rethinking tree-ring watermarking for enhanced multi-key identification
Abstract We revisit Tree-Ring Watermarking, a recent diffusion model watermarking method
that demonstrates great robustness to various attacks. We conduct an in-depth study on it …
that demonstrates great robustness to various attacks. We conduct an in-depth study on it …
Efficient dense-field copy–move forgery detection
D Cozzolino, G Poggi… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We propose a new algorithm for the accurate detection and localization of copy-move
forgeries, based on rotation-invariant features computed densely on the image. Dense-field …
forgeries, based on rotation-invariant features computed densely on the image. Dense-field …
An evaluation of popular copy-move forgery detection approaches
V Christlein, C Riess, J Jordan, C Riess… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
A copy-move forgery is created by copying and pasting content within the same image, and
potentially postprocessing it. In recent years, the detection of copy-move forgeries has …
potentially postprocessing it. In recent years, the detection of copy-move forgeries has …
Information forensics: An overview of the first decade
In recent decades, we have witnessed the evolution of information technologies from the
development of VLSI technologies, to communication and networking infrastructure, to the …
development of VLSI technologies, to communication and networking infrastructure, to the …
A survey of digital image watermarking techniques
Watermarking, which belong to the information hiding field, has seen a lot of research
interest. There is a lot of work begin conducted in different branches in this field …
interest. There is a lot of work begin conducted in different branches in this field …
Digital watermarking techniques for image security: a review
A Mohanarathinam, S Kamalraj… - Journal of Ambient …, 2020 - Springer
Multimedia technology usages is increasing day by day and to provide authorized data and
protecting the secret information from unauthorized use is highly difficult and involves a …
protecting the secret information from unauthorized use is highly difficult and involves a …
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied
and pasted on another part of the same image. In this paper, we propose a new approach …
and pasted on another part of the same image. In this paper, we propose a new approach …
Robust and secure image hashing
A Swaminathan, Y Mao, M Wu - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Image hash functions find extensive applications in content authentication, database search,
and watermarking. This paper develops a novel algorithm for generating an image hash …
and watermarking. This paper develops a novel algorithm for generating an image hash …