Fragile watermarking with error-free restoration capability

X Zhang, S Wang - IEEE Transactions on Multimedia, 2008 - ieeexplore.ieee.org
This paper proposes a novel fragile watermarking scheme capable of perfectly recovering
the original image from its tampered version. In the scheme, a tailor-made watermark …

An image fragile watermark scheme based on chaotic image pattern and pixel-pairs

SH Liu, HX Yao, W Gao, YL Liu - Applied Mathematics and Computation, 2007 - Elsevier
Fragile watermarking techniques for digital content have been studied in the past few years.
Fragile watermarks are used to determine if a piece of watermarked digital content has been …

Automatic image authentication and recovery using fractal code embedding and image inpainting

SS Wang, SL Tsai - Pattern Recognition, 2008 - Elsevier
In this paper, we propose a novel scheme of automatic image authentication and recovery,
in which the altered region of the image can be detected and recovered in a fully automated …

[PDF][PDF] A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform

P MeenakshiDevi, M Venkatesan… - Journal of Computer …, 2009 - Citeseer
Problem statement: In recent years, as digital media are gaining wider popularity, their
security related issues are becoming greater concern. Method for authenticating and …

Pinpoint authentication watermarking based on a chaotic system

R Ni, Q Ruan, Y Zhao - Forensic Science International, 2008 - Elsevier
Watermarking technique is one of the active research fields in recent ten years, which can
be used in copyright management, content authentication, and so on. For the authentication …

Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication

S Poonkuntran, RS Rajesh - Multimedia tools and applications, 2014 - Springer
This paper proposes a new reversible, imperceptible, semi fragile watermarking scheme for
the authentication of digital fundus images that satisfies eight mandatory requirements. They …

A secure watermark embedding approach based on chaotic map for image tamper detection

MJ Barani, MY Valandar, P Ayubi - 2015 7th Conference on …, 2015 - ieeexplore.ieee.org
Authentication is an important concept in transferring data such as images, videos and etc.
In this paper, a new authentication method based on watermark embedding is proposed …

[PDF][PDF] Splicing image and its localization: a survey

J Wang, Y Li - Journal of Information Hiding and Privacy …, 2019 - researchgate.net
With the rapid development of information technology, digital images have become an
important medium for information transmission. However, manipulating images is becoming …

A reversible image authentication method without memorization of hiding parameters

S Han, M Fujiyoshi, H Kiya - IEICE transactions on fundamentals of …, 2009 - search.ieice.org
This paper proposes a novel reversible image authentication method that does not
memorize the parameters for extracting embedded authentication data from an image. The …

Tamper-localization watermarking with systematic error correcting code

Y Wu - 2006 International Conference on Image Processing, 2006 - ieeexplore.ieee.org
This paper presents an authentication watermarking method which can localize the
tampering regions in fine granularity. Unlike the previous block-wise tampering-localization …