[图书][B] Digital watermarking and steganography: fundamentals and techniques

FY Shih - 2017 - taylorfrancis.com
This book intends to provide a comprehensive overview on different aspects of mechanisms
and techniques for information security. It is written for students, researchers, and …

Reversible fragile watermarking for locating tampered blocks in JPEG images

X Zhang, S Wang, Z Qian, G Feng - Signal processing, 2010 - Elsevier
This paper proposes a novel fragile watermarking scheme for JPEG image authentication.
The watermark is generated by folding the hash results of quantized coefficients, and each …

An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection

L Tian, N Zheng, J Xue, C Li, X Wang - Signal Processing: Image …, 2011 - Elsevier
This paper proposes an integrated visual saliency-based watermarking approach, which
can be used for both synchronous image authentication and copyright protection. Firstly …

A watermark-based scheme for authenticating JPEG image integrity

OJ Kwon, S Choi, B Lee - IEEE Access, 2018 - ieeexplore.ieee.org
JPEG is the most common image format in smartphones, computers, or digital cameras.
Because numerous JPEG images are easily shared and distributed, there are privacy and …

[图书][B] Intelligent copyright protection for images

SS Roy, A Basu, A Chattopadhyay - 2019 - taylorfrancis.com
This book describes the need of copyright protection for multimedia objects and develops an
invisible image watermarking scheme to serve the purpose of copyright protection. Here …

An improved fragile watermarking algorithm for JPEG images

D Caragata, S El Assad, M Luduena - AEU-International Journal of …, 2015 - Elsevier
In this paper a new fragile watermarking algorithm is proposed that is built upon the
cryptanalysis of the CWSA algorithm (Chaotic Watermarking Scheme for Authentication of …

Cryptanalysis of an improved fragile watermarking scheme

D Caragata, JA Mucarquer, M Koscina… - AEU-International Journal …, 2016 - Elsevier
This paper presents two attacks on Teng et al.'s fragile watermarking algorithm. Both attacks
allow the attacker to apply valid watermarks on tampered images, therefore rendering the …

[PDF][PDF] Fragile watermarking for image authentication: survey

P Jain, AS Rajawat - International Journal of Electronics and Computer …, 2012 - Citeseer
In this paper, we report results from comparative study on various related and relevant
aspects of the digital watermarking such as image authentication techniques using fragile …

A blind watermarking scheme using bitplane of DC component for JPEG Compressed images

MI Khan, V Jeoti - 2010 6th International Conference on …, 2010 - ieeexplore.ieee.org
In this paper a watermarking technique has been proposed. The proposed watermarking
technique has been incorporated in the JPEG compression standard. Unlike conventional …

[PDF][PDF] Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content

T TUNCER - International Journal of Computer Network and …, 2018 - mecs-press.org
Watermarking techniques are widely used for image authentication and copyright protection.
Weaknesses of the “A novel CRT-based watermarking technique for authentication of …