Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
DCT-Based Reversible Image Watermarking Approach
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 02
Reversible Steganographic Method with High Payload for JPEG Images
IEICE - Transactions on Information and Systems
Reversible Watermarking Method for JPEG Images
IEICE - Transactions on Information and Systems
A Novel Difference Expansion Transform for Reversible Data Embedding
IEEE Transactions on Information Forensics and Security
Fragile Watermarking With Error-Free Restoration Capability
IEEE Transactions on Multimedia
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Reversible watermark using the difference expansion of a generalized integer transform
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding into images using wavelet techniques and sorting
IEEE Transactions on Image Processing
Lossless watermarking for image authentication: a new framework and an implementation
IEEE Transactions on Image Processing
Expansion Embedding Techniques for Reversible Watermarking
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Reversible data hiding for JPEG images based on histogram pairs
ICIAR'07 Proceedings of the 4th international conference on Image Analysis and Recognition
A DCT-SVD based robust watermarking scheme for grayscale image
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A high capacity lossless data hiding scheme for JPEG images
Journal of Systems and Software
Hi-index | 0.08 |
This paper proposes a novel fragile watermarking scheme for JPEG image authentication. The watermark is generated by folding the hash results of quantized coefficients, and each block is used to carry two watermark bits using a reversible data-hiding method. Because modification to the cover is small, the visual quality of watermarked image is satisfactory. On the receiver side, one may attempt to extract the watermark and recover the original content. By measuring mismatch between the watermark data extracted from the received image and derived from the recovered content, the blocks containing fake content can be located accurately, while the original information in the other blocks is retrieved without any error as long as the tampered area is not extensive.