A review of image watermarking for identity protection and verification
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …
A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …
A survey on reversible watermarking for multimedia content: A robustness overview
A Menendez-Ortiz, C Feregrino-Uribe… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the growth of the Internet along with multimedia data delivery, have caused
the misuse and even alteration of the original digital content. As a security mechanism …
the misuse and even alteration of the original digital content. As a security mechanism …
Fragile watermarking schemes for image authentication: a survey
K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …
proposed in the past decade. The limited embedding capacity and extent of tampering are …
A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability
The rapid developments of storage technology and information exchange encourage the
development of research in the field of information security. In the process of sending …
development of research in the field of information security. In the process of sending …
New fragile watermarking method for stereo image authentication with localization and recovery
M Yu, J Wang, G Jiang, Z Peng, F Shao… - AEU-International Journal …, 2015 - Elsevier
To address issues of image authenticity verification and integrity protection, a fragile
watermarking method for stereo image authentication is proposed with stereo matching …
watermarking method for stereo image authentication is proposed with stereo matching …
Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
A Renklier, S Öztürk - Multimedia Tools and Applications, 2024 - Springer
In recent years, image forgery has become an important issue with the use of images in
many important areas. Several self-embedding fragile watermarking methods have been …
many important areas. Several self-embedding fragile watermarking methods have been …
Improved image tamper localisation using chaotic maps and self-recovery
K Sreenivas, V Kamakshiprasad - Journal of Visual Communication and …, 2017 - Elsevier
In this paper an image tamper localisation scheme is proposed in which authentication bits
of a 2× 2 image block are generated using the chaotic maps. Further the scheme is …
of a 2× 2 image block are generated using the chaotic maps. Further the scheme is …
Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication
Semi-fragile self-recoverable watermarking algorithms are important to meet various
requirements such as security, robustness, localization, and image recovery. However …
requirements such as security, robustness, localization, and image recovery. However …