Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Fragile Watermarking Scheme with Extensive Content Restoration Capability
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A novel image hash algorithm resistant to print-scan
Signal Processing
A secure and robust hash-based scheme for image authentication
Signal Processing
An effective pixel-wise fragile watermarking scheme based on ARA bits
Proceedings of the 2011 International Conference on Communication, Computing & Security
Time-frequency and time-scale-based fragile watermarking methods for image authentication
EURASIP Journal on Advances in Signal Processing - Special issue on time-frequency analysis and its applications to multimedia signals
Multimedia Tools and Applications
Logistic map-based fragile watermarking for pixel level tamper detection and resistance
EURASIP Journal on Information Security
Self recoverable block-wise fragile watermarking scheme based on histogram segmentation
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Self-embedding watermark with flexible restoration quality
Multimedia Tools and Applications
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Hi-index | 0.08 |
This paper proposes a novel fragile watermarking scheme with a hierarchical mechanism, in which pixel-derived and block-derived watermark data are carried by the least significant bits of all pixels. On the receiver side, after identifying the blocks containing tampered content, the watermark data hidden in the rest blocks are exploited to exactly locate the tampered pixels. Moreover, using exhaustive attempts, the proposed scheme is capable of recovering the original watermarked version without any error.