Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
DCT based efficient fragile watermarking scheme for image authentication and restoration
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …
restoration are very essential, especially when it is utilized in forensic science, medical …
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
This paper proposes a novel watermarking scheme with flexible self-recovery quality. The
embedded watermark data for content recovery are calculated from the original discrete …
embedded watermark data for content recovery are calculated from the original discrete …
Fragile watermarking schemes for image authentication: a survey
K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …
proposed in the past decade. The limited embedding capacity and extent of tampering are …
[HTML][HTML] Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic
M Jana, B Jana, S Joardar - Journal of King Saud University-Computer and …, 2022 - Elsevier
The aim of designing self-embedding fragile watermarking is copy-right protection, tamper
localization and image recovery. This paper proposes a self-embedding fragile …
localization and image recovery. This paper proposes a self-embedding fragile …
A novel color image tampering detection and self-recovery based on fragile watermarking
X Xia, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …
Efficient method for content reconstruction with self-embedding
P Korus, A Dziech - IEEE Transactions on Image Processing, 2012 - ieeexplore.ieee.org
This paper presents a new model of the content reconstruction problem in self-embedding
systems, based on an erasure communication channel. We explain why such a model is a …
systems, based on an erasure communication channel. We explain why such a model is a …
A source-channel coding approach to digital image protection and self-recovery
S Sarreshtedari, MA Akhaee - IEEE transactions on image …, 2015 - ieeexplore.ieee.org
Watermarking algorithms have been widely applied to the field of image forensics recently.
One of these very forensic applications is the protection of images against tampering. For …
One of these very forensic applications is the protection of images against tampering. For …
[HTML][HTML] Fast fragile watermark embedding and iterative mechanism with high self-restoration performance
This paper presents a new algorithm to reduce significantly the computational cost of one of
the best methods with self-recovery capabilities in the fragile watermarking literature. This is …
the best methods with self-recovery capabilities in the fragile watermarking literature. This is …