Robust image watermarking in the spatial domain
Signal Processing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery
ISMSE '04 Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Dual watermark for image tamper detection and recovery
Pattern Recognition
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
IEEE Transactions on Multimedia
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing
Three-sided side match finite-state vector quantization
IEEE Transactions on Circuits and Systems for Video Technology
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
IEEE Transactions on Circuits and Systems for Video Technology
Fragile watermarking for color image recovery based on color filter array interpolation
WAIM'10 Proceedings of the 11th international conference on Web-age information management
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
Yet another multiple-image encryption by rotating random grids
Signal Processing
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Image Dimensionality Reduction Based on the Intrinsic Dimension and Parallel Genetic Algorithm
International Journal of Cognitive Informatics and Natural Intelligence
Towards information-theoretic K-means clustering for image indexing
Signal Processing
Self-embedding fragile watermarking scheme combined average with VQ encoding
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.08 |
In this paper, a tampered image recovery scheme is proposed by creating an index table of the original image via vector quantization (VQ) and embedding it into the original image as a basis for recovery. In order to complete the goal of image authentication and recovery, Wong's watermarking scheme [P.W. Wong, N. Memon, Secret an public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process 10 (10) (2001) 1593-1601] is employed to perform tamper detection. Wong's watermarking scheme can be used to accurately locate tampered regions. If an image has been tampered, the index table can be used to recover the tampered regions. The experimental results indicate that our scheme has the higher probability of image recovery. Besides, compared with Lee and Lin's [Dual watermark for image tamper detection and recovery, Pattern Recognition 41 (2008) 3497-3506] scheme, our scheme provides not only a better quality of recovered images but also better results at edge regions.