A Binary Single-Key-Lock System for Access Control
IEEE Transactions on Computers
Secret image sharing with steganography and authentication
Journal of Systems and Software
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
An efficient image authentication method based on Hamming code
Pattern Recognition
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
Analysis and design of secure watermark-based authentication systems
IEEE Transactions on Information Forensics and Security
Fragile Watermarking Based on Encoding of the Zeroes of the -Transform
IEEE Transactions on Information Forensics and Security
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving
IEEE Transactions on Multimedia
Multiple Image Watermarking Applied to Health Information Management
IEEE Transactions on Information Technology in Biomedicine
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
A new data hiding method via revision history records on collaborative writing platforms
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Secure randomized image watermarking based on singular value decomposition
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has occurred. Because recent watermarking techniques seriously distort the quality of the protected image after embedding the authentication code into the image content, attention has been drawn to how to satisfy both the need for image fidelity and detection ability. To account for the influence from both essentials, a novel algorithm is proposed in this article. The new scheme utilizes a weighted-sum function to embed (n + 1) authentication bits into a block with 2n pixels by modifying only one original pixel with (±1). With fewer authentication codes, the new process can protect the content of the image. The experimental results demonstrate that the approach can guarantee the fidelity of the watermarked image while retaining tamper-proof functionality.