Fragile watermarking with error-free restoration capability
X Zhang, S Wang - IEEE Transactions on Multimedia, 2008 - ieeexplore.ieee.org
This paper proposes a novel fragile watermarking scheme capable of perfectly recovering
the original image from its tampered version. In the scheme, a tailor-made watermark …
the original image from its tampered version. In the scheme, a tailor-made watermark …
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years.
Fragile watermarks are used to determine if a piece of watermarked digital content has been …
Fragile watermarks are used to determine if a piece of watermarked digital content has been …
Automatic image authentication and recovery using fractal code embedding and image inpainting
SS Wang, SL Tsai - Pattern Recognition, 2008 - Elsevier
In this paper, we propose a novel scheme of automatic image authentication and recovery,
in which the altered region of the image can be detected and recovered in a fully automated …
in which the altered region of the image can be detected and recovered in a fully automated …
[PDF][PDF] A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform
P MeenakshiDevi, M Venkatesan… - Journal of Computer …, 2009 - Citeseer
Problem statement: In recent years, as digital media are gaining wider popularity, their
security related issues are becoming greater concern. Method for authenticating and …
security related issues are becoming greater concern. Method for authenticating and …
Pinpoint authentication watermarking based on a chaotic system
R Ni, Q Ruan, Y Zhao - Forensic Science International, 2008 - Elsevier
Watermarking technique is one of the active research fields in recent ten years, which can
be used in copyright management, content authentication, and so on. For the authentication …
be used in copyright management, content authentication, and so on. For the authentication …
Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication
S Poonkuntran, RS Rajesh - Multimedia tools and applications, 2014 - Springer
This paper proposes a new reversible, imperceptible, semi fragile watermarking scheme for
the authentication of digital fundus images that satisfies eight mandatory requirements. They …
the authentication of digital fundus images that satisfies eight mandatory requirements. They …
A secure watermark embedding approach based on chaotic map for image tamper detection
Authentication is an important concept in transferring data such as images, videos and etc.
In this paper, a new authentication method based on watermark embedding is proposed …
In this paper, a new authentication method based on watermark embedding is proposed …
[PDF][PDF] Splicing image and its localization: a survey
J Wang, Y Li - Journal of Information Hiding and Privacy …, 2019 - researchgate.net
With the rapid development of information technology, digital images have become an
important medium for information transmission. However, manipulating images is becoming …
important medium for information transmission. However, manipulating images is becoming …
A reversible image authentication method without memorization of hiding parameters
S Han, M Fujiyoshi, H Kiya - IEICE transactions on fundamentals of …, 2009 - search.ieice.org
This paper proposes a novel reversible image authentication method that does not
memorize the parameters for extracting embedded authentication data from an image. The …
memorize the parameters for extracting embedded authentication data from an image. The …
Tamper-localization watermarking with systematic error correcting code
Y Wu - 2006 International Conference on Image Processing, 2006 - ieeexplore.ieee.org
This paper presents an authentication watermarking method which can localize the
tampering regions in fine granularity. Unlike the previous block-wise tampering-localization …
tampering regions in fine granularity. Unlike the previous block-wise tampering-localization …