Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
Recover the tampered image based on VQ indexing
Signal Processing
SVD-based digital image watermarking scheme
Pattern Recognition Letters
A reversible data hiding scheme using complementary embedding strategy
Information Sciences: an International Journal
Image self-embedding with high-quality restoration capability
Digital Signal Processing
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Fragile Watermarking With Error-Free Restoration Capability
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
The Nonsubsampled Contourlet Transform: Theory, Design, and Applications
IEEE Transactions on Image Processing
Reference Sharing Mechanism for Watermark Self-Embedding
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
IEEE Transactions on Circuits and Systems for Video Technology
Perceptual image hashing with histogram of color vector angles
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Fast communication: Robust image hashing using ring-based entropies
Signal Processing
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.08 |
In this paper, we propose a novel fragile watermarking scheme with content restoration capability. Authentication-bits are produced using the image hashing method with a folding operation. The low-frequency component of the nonsubsampled contourlet transform (NSCT) coefficients is used to encode the restoration-bits for each block by the adaptive bit allocation mechanism. During the bit allocation, all the blocks are categorized into different types according to their degree of smoothness, and, complex blocks, which are deemed to have higher priority than smooth blocks, are allocated more bits. Two algorithms are utilized to adjust the block classification and the binary representations in order to guarantee that the numbers of the self-embedding authentication-bits and restoration-bits are exactly suitable for 1-LSB embedding capacity. On the receiver side, the extracted authentication-bits and the decoded restoration-bits are used to localize and restore the tampered blocks, respectively. Due to the low embedding volume, the visual quality of the watermarked image is satisfactory. Experimental results also show that the proposed scheme provides high restoration quality.