Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Sharing secret images using shadow codebooks
Information Sciences—Informatics and Computer Science: An International Journal
Communications of the ACM
Detection and restoration of tampered JPEG compressed images
Journal of Systems and Software
Secret image sharing with steganography and authentication
Journal of Systems and Software
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
Image Communication
Finding collisions in the full SHA-1
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Cocktail watermarking for digital image protection
IEEE Transactions on Multimedia
On the design of content-based multimedia authentication systems
IEEE Transactions on Multimedia
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
An image-sharing method with user-friendly shadow images
IEEE Transactions on Circuits and Systems for Video Technology
Tampering resistant dual watermarking method for copyright protection of still images
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Tampering resistant self recoverable watermarking method using error correction codes
International Journal of Information and Computer Security
Hi-index | 0.00 |
This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to recover from tampering, the recovery data are shared by using an (r, n) threshold scheme and then scattered all over the image. Experimental results indicate that the visual quality of the watermarked image is acceptable, and that the positions of the tampered portions can be identified. Most importantly, the self -recovery result is very competitive.