Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
Wavelet packets-based digital watermarking for image verification and authentication
Signal Processing - Special section: Security of data hiding technologies
Robust image authentication using content based compression
Multimedia Systems
An efficient image authentication method based on Hamming code
Pattern Recognition
A feature-based robust digital image watermarking scheme
IEEE Transactions on Signal Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Robust image watermarking based on generalized Radon transformations
IEEE Transactions on Circuits and Systems for Video Technology
A high quality image sharing with steganography and adaptive authentication scheme
Journal of Systems and Software
Performance evaluation of moment-based watermarking methods: A review
Journal of Systems and Software
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Journal of Systems and Software
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps
Journal of Systems and Software
Chaos-based selective encryption for H.264/AVC
Journal of Systems and Software
Hi-index | 0.00 |
In this work, a secure fragile watermarking scheme is proposed. Images are protected and any modification to an image is detected using a novel hybrid scheme combining a two-pass logistic map with Hamming code. For security purposes, the two-pass logistic map scheme contains a private key to resist the vector quantization (VQ) attacks even though the embedding scheme is block independent. To ensure image integrity, watermarks are embedded into the to-be-protected images which are generated using Hamming code technique. Experimental results show that the proposed scheme has satisfactory protection ability and can detect and locate various malicious tampering via image insertion, erasing, burring, sharpening, contrast modification, and even though burst bits. Additionally, experiments prove that the proposed scheme successfully resists VQ attacks.