Secure data hiding techniques: a survey

L Singh, AK Singh, PK Singh - Multimedia Tools and Applications, 2020 - Springer
This article presents a detailed discussion of different prospects of digital image
watermarking. This discussion of watermarking included: brief comparison of similar …

A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression

JC Patra, JE Phua, C Bornand - Digital Signal Processing, 2010 - Elsevier
Digital watermarking techniques have been proposed for copyright protection and
authentication of multimedia data. In this paper, we propose a novel Chinese Remainder …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …

A secure image watermarking using Chinese remainder theorem based on haar wavelet transform

U Sudibyo, F Eranisa… - 2017 4th International …, 2017 - ieeexplore.ieee.org
This study proposed concealment of information through watermarking techniques using a
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …

Adjustable prediction-based reversible data hiding

CF Lee, HL Chen - Digital Signal Processing, 2012 - Elsevier
Reversible data hiding has received considerable interest recently in the field of information
hiding. However, most of difference expansion (DE-based) schemes suffer from the problem …

A novel reversible robust watermarking algorithm based on chaotic system

Q Gu, T Gao - Digital Signal Processing, 2013 - Elsevier
Reversible watermarking can be applied to the protection for important digital media, such
as medical and military image, it allows the watermark to be extracted and the original image …

A novel image watermarking method based on center symmetric local binary pattern with minimum distortion

T Tuncer, M Kaya - Optik, 2019 - Elsevier
In this study, a novel semi-fragile image-watermarking method based on Center-Symmetric
Local Binary Patterns (CSLBP) in integer wavelet domain is proposed. Integer Wavelet …

Robust image embedded watermarking using DCT and listless SPIHT

JLD Shivani, RK Senapati - Future Internet, 2017 - mdpi.com
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in
hierarchical trees (SPIHT) digital watermarking technique that is robust against several …

Fragile high capacity data hiding in digital images using integer-to-integer DWT and lattice vector quantization

E Akhtarkavan, B Majidi, MFM Salleh… - Multimedia Tools and …, 2020 - Springer
Data hiding in digital multimedia has been extensively used for sensitive data transmission
and data authentication. An important property of data hiding which makes this method …

Crt-based fragile self-recovery watermarking scheme for image authentication and recovery

B Patra, JC Patra - 2012 international symposium on intelligent …, 2012 - ieeexplore.ieee.org
Fragile watermarking is one of the effective techniques for authentication of digital
documents and images. However, recovering the content of the tampered region in a …