SPEE: a secure program execution environment tool using code integrity checking
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
An efficient image authentication method based on Hamming code
Pattern Recognition
A majority-voting based watermarking scheme for color image tamper detection and recovery
Computer Standards & Interfaces
Digital watermarking based on chaotic map and reference register
Pattern Recognition
Image content authentication using pinned sine transform
EURASIP Journal on Applied Signal Processing
Adaptive lossless steganographic scheme with centralized difference expansion
Pattern Recognition
Hierarchical watermarking technique of distortion control mechanism
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Block-Chain Based Fragile Watermarking Scheme with Superior Localization
Information Hiding
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
Neighbor-Aided Authentication Watermarking Based on a Chaotic System with Feedback
IEICE - Transactions on Information and Systems
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Recover the tampered image based on VQ indexing
Signal Processing
Journal on Image and Video Processing - Special issue on distributed video coding
A high capacity reversible data hiding scheme with edge prediction and difference expansion
Journal of Systems and Software
Fragile watermarking based on localized histogram modification
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
On the security of a fragile digital image watermarking scheme
GVE '07 Proceedings of the IASTED International Conference on Graphics and Visualization in Engineering
Hash-based identification of sparse image tampering
IEEE Transactions on Image Processing
Security analysis on "A chaotic fragile watermarking technique with precise localization"
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Enhancement of image watermark retrieval based on genetic algorithms
Journal of Visual Communication and Image Representation
An adjusted-purpose digital watermarking technique
Pattern Recognition
SVD-based digital image watermarking scheme
Pattern Recognition Letters
A novel public key self-embedding fragile watermarking technique for image authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Information Sciences: an International Journal
Fragile watermarking for color image recovery based on color filter array interpolation
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Passive detection of paint-doctored JPEG images
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Multimedia Tools and Applications
A secure fragile watermarking scheme based on chaos-and-hamming code
Journal of Systems and Software
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
A fragile image watermarking based on mass and centroid
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
A study on image electronic money based on watermarking technique
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Fragile watermarking tamper detection with images compressed by fuzzy transform
Information Sciences: an International Journal
Lossless data hiding for high embedding capacity
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
High capacity lossless data hiding
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
Multi-block dependency based fragile watermarking scheme for fingerprint images protection
Multimedia Tools and Applications
Counterfeiting attacks on block-wise dependent fragile watermarking schemes
Proceedings of the 6th International Conference on Security of Information and Networks
Multimedia Tools and Applications
Hi-index | 0.02 |
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve security. Using a hierarchical structure, we propose a method that thwarts the VQ attack while sustaining the superior localization properties of blockwise independent watermarking methods. In particular, we propose dividing the image into blocks in a multilevel hierarchy and calculating block signatures in this hierarchy. While signatures of small blocks on the lowest level of the hierarchy ensure superior accuracy of tamper localization, higher level block signatures provide increasing resistance to VQ attacks. At the top level, a signature calculated using the whole image completely thwarts the counterfeiting attack. Moreover, "sliding window" searches through the hierarchy enable the verification of untampered regions after an image has been cropped. We provide experimental results to demonstrate the effectiveness of our method