Secure data hiding techniques: a survey
This article presents a detailed discussion of different prospects of digital image
watermarking. This discussion of watermarking included: brief comparison of similar …
watermarking. This discussion of watermarking included: brief comparison of similar …
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
JC Patra, JE Phua, C Bornand - Digital Signal Processing, 2010 - Elsevier
Digital watermarking techniques have been proposed for copyright protection and
authentication of multimedia data. In this paper, we propose a novel Chinese Remainder …
authentication of multimedia data. In this paper, we propose a novel Chinese Remainder …
Fragile watermarking schemes for image authentication: a survey
K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …
proposed in the past decade. The limited embedding capacity and extent of tampering are …
A secure image watermarking using Chinese remainder theorem based on haar wavelet transform
U Sudibyo, F Eranisa… - 2017 4th International …, 2017 - ieeexplore.ieee.org
This study proposed concealment of information through watermarking techniques using a
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …
Adjustable prediction-based reversible data hiding
CF Lee, HL Chen - Digital Signal Processing, 2012 - Elsevier
Reversible data hiding has received considerable interest recently in the field of information
hiding. However, most of difference expansion (DE-based) schemes suffer from the problem …
hiding. However, most of difference expansion (DE-based) schemes suffer from the problem …
A novel reversible robust watermarking algorithm based on chaotic system
Q Gu, T Gao - Digital Signal Processing, 2013 - Elsevier
Reversible watermarking can be applied to the protection for important digital media, such
as medical and military image, it allows the watermark to be extracted and the original image …
as medical and military image, it allows the watermark to be extracted and the original image …
A novel image watermarking method based on center symmetric local binary pattern with minimum distortion
In this study, a novel semi-fragile image-watermarking method based on Center-Symmetric
Local Binary Patterns (CSLBP) in integer wavelet domain is proposed. Integer Wavelet …
Local Binary Patterns (CSLBP) in integer wavelet domain is proposed. Integer Wavelet …
Robust image embedded watermarking using DCT and listless SPIHT
JLD Shivani, RK Senapati - Future Internet, 2017 - mdpi.com
This paper presents a DCT-based (DCT: discrete cosine transform) listless set partitioning in
hierarchical trees (SPIHT) digital watermarking technique that is robust against several …
hierarchical trees (SPIHT) digital watermarking technique that is robust against several …
Fragile high capacity data hiding in digital images using integer-to-integer DWT and lattice vector quantization
Data hiding in digital multimedia has been extensively used for sensitive data transmission
and data authentication. An important property of data hiding which makes this method …
and data authentication. An important property of data hiding which makes this method …
Crt-based fragile self-recovery watermarking scheme for image authentication and recovery
Fragile watermarking is one of the effective techniques for authentication of digital
documents and images. However, recovering the content of the tampered region in a …
documents and images. However, recovering the content of the tampered region in a …