Digital video tampering detection and localization: Review, representations, challenges and algorithm

N Akhtar, M Saddique, K Asghar, UI Bajwa, M Hussain… - Mathematics, 2022 - mdpi.com
Digital videos are now low-cost, easy to capture and easy to share on social media due to
the common feature of video recording in smart phones and digital devices. However, with …

Blockchain for digital rights management

Z Ma, M Jiang, H Gao, Z Wang - Future Generation Computer Systems, 2018 - Elsevier
Online digital content service becomes more and more easily, however, free consumption
and excessive spreading without rights protection will hurt the content providers' benefits …

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy

C Qin, P Ji, X Zhang, J Dong, J Wang - Signal processing, 2017 - Elsevier
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlapping embedding strategy. The block-wise mechanism for …

[PDF][PDF] Detection of video forgery: A review of literature

OI Al-Sanjary, G Sulong - Journal of Theoretical & Applied …, 2015 - researchgate.net
In the current times the level of video forgery has increased on the internet with the increase
in the role of malware that has made it possible for any user to upload, download and share …

Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique

G Badshah, SC Liew, JM Zain, M Ali - Journal of digital imaging, 2016 - Springer
In teleradiology, image contents may be altered due to noisy communication channels and
hacker manipulation. Medical image data is very sensitive and can not tolerate any illegal …

Joint encryption and compression-based watermarking technique for security of digital documents

AK Singh, S Thakur, A Jolfaei, G Srivastava… - ACM Transactions on …, 2021 - dl.acm.org
Recently, due to the increase in popularity of the Internet, the problem of digital data security
over the Internet is increasing at a phenomenal rate. Watermarking is used for various …

A passive approach for effective detection and localization of region-level video forgery with spatio-temporal coherence analysis

CS Lin, JJ Tsay - Digital Investigation, 2014 - Elsevier
In this paper, we present a passive approach for effective detection and localization of
region-level forgery from video sequences possibly with camera motion. As most digital …

Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode

C Qin, H Wang, X Zhang, X Sun - Information sciences, 2016 - Elsevier
In this paper, we propose a novel self-embedding fragile image watermarking scheme for
tampering recovery based on reference-data interleaving mechanism and adaptive …

A novel pixel-wise authentication-based self-embedding fragile watermarking method

E Gul, S Ozturk - Multimedia Systems, 2021 - Springer
Self-embedding fragile watermarking algorithms can perform detection of the manipulated
areas as well as recovery of these detected areas. Most of the self-embedding fragile …

Chaotic watermark for blind forgery detection in images

O Benrhouma, H Hermassi, AA Abd El-Latif… - Multimedia Tools and …, 2016 - Springer
In this paper, a new chaos based watermarking scheme for effective tamper detection in
images is proposed. The proposed scheme is able to detect any possible forgery and spot …