Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
Recover the tampered image based on VQ indexing
Signal Processing
IEEE Transactions on Circuits and Systems for Video Technology
A hypothesis testing approach to semifragile watermark-based authentication
IEEE Transactions on Information Forensics and Security
Image Authentication Scheme Based on Self-embedding Watermarking
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Semi-fragile Zernike moment-based image water marking for authentication
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
A quantization-based semi-fragile watermarking scheme for image content authentication
Journal of Visual Communication and Image Representation
An image authentication scheme based on digital watermarking and image secret sharing
Multimedia Tools and Applications
Memoryless hash-based perceptual image authentication
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
Semi-fragile watermarking techniques aim at detecting malicious manipulations on an image, while allowing acceptable manipulations such as lossy compression. Although both of these manipulations are considered to be pixel value changes, semi-fragile watermarks should be sensitive to malicious manipulations but robust to the degradation introduced by lossy compression and other defined acceptable manipulations. In this paper, after studying the characteristics of both natural images and malicious manipulations, we propose two new semi-fragile authentication techniques robust against lossy compression, using random bias and nonuniform quantization, to improve the performance of the methods proposed by Lin and Chang.