Blind dual image watermarking for copyright protection, tamper proofing and self-recovery

MQ Fan - Multimedia Tools and Applications, 2023 - Springer
In this paper, a blind dual image watermarking scheme for copyright protection, tamper
proofing and self-recovery is proposed. For purpose of copyright protection, we use binary …

A robust watermarking approach for security issue of binary documents using fully convolutional networks

VL Cu, T Nguyen, JC Burie, JM Ogier - International Journal on Document …, 2020 - Springer
Motivated by increasing possibility of the tampering of genuine documents during a
transmission over digital channels, we focus on developing a watermarking framework for …

A high-capacity text watermarking method based on geometric micro-distortion

X Wang, Y Jin - 2022 26th International Conference on Pattern …, 2022 - ieeexplore.ieee.org
Motivated by the increasing necessity of copyright protection for textual documents, we
propose an automatic generation method for high-capacity text watermarking that leverages …

A fuzzy logic based contrast and edge sensitive digital image watermarking technique

JP Dhar, MS Islam, MA Ullah - SN applied sciences, 2019 - Springer
In this paper, a fuzzy logic based digital image watermarking technique is proposed. The
contrast and edge values of the host image are analyzed by the fuzzy inference system (FIS) …

A Region-Selective Anti-compression Image Encryption Algorithm Based on Deep Networks

Z Chen, Y Liu, G Ke, J Wang, W Zhao, S Lo - International Journal of …, 2024 - Springer
In recent years, related research has focused on how to safely transfer and protect the
privacy of images in social network services while providing easy access by authorized …

Watermarking for security issue of handwritten documents with fully convolutional networks

VL Cu, JC Burie, JM Ogier - 2018 16th International …, 2018 - ieeexplore.ieee.org
To prevent falsification of handwriting document images, the methods of forensic document
examination are widely used to determine the origin and authenticity of a given document. In …

Hiding security feature into text content for securing documents using generated font

VL Cu, JC Burie, JM Ogier… - … International conference on …, 2019 - ieeexplore.ieee.org
Motivated by increasing possibility of the tampering of genuine documents during a
transmission over digital channels, we focus on developing a watermarking framework for …

A robust data hiding scheme using generated content for securing genuine documents

VL Cu, JC Burie, JM Ogier… - … Conference on Document …, 2019 - ieeexplore.ieee.org
Data hiding is an effective technique, compared to pervasive black-and-white code patterns
such as barcode and quick response code, which can be used to secure document images …

Optimal secure information using digital watermarking and fuzzy rule base

MT Naseem, M Nadeem, IM Qureshi… - Multimedia Tools and …, 2019 - Springer
Digital image watermarking is one of the active area of research for data authentication and
data hiding. Imperceptibility of the image is the main aspect that confines the amount of …

Fuzzy logic with superpixel-based block similarity measures for secured data hiding scheme

PK Singh, B Jana, K Datta, P Mura… - … Conference on Frontiers …, 2022 - Springer
With time, humans have realized, the internet is the best alternative for exchange of
messages through multimedia documents, especially images. Thus, its imperceptibility and …