Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
On the design of content-based multimedia authentication systems
IEEE Transactions on Multimedia
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
IEEE Transactions on Information Technology in Biomedicine
Applying projection and B-spline to image authentication and remedy
IEEE Transactions on Consumer Electronics
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Combining copyright protection and data hiding: a sensitive transformation approach
ISCGAV'06 Proceedings of the 6th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision
Joint coding and embedding techniques for multimedia images
Information Sciences: an International Journal
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Reversible Fragile Watermarking for E-Learning Media
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
A visible watermarking algorithm based on the content and contrast aware (COCOA) technique
Journal of Visual Communication and Image Representation
A semi-blind watermarking based on discrete wavelet transform
ICICS'07 Proceedings of the 9th international conference on Information and communications security
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Computer Standards & Interfaces
Fragile watermarking tamper detection with images compressed by fuzzy transform
Information Sciences: an International Journal
Digital Image Protection using Keyed Hash Function
International Journal of Computer Vision and Image Processing
Multi-block dependency based fragile watermarking scheme for fingerprint images protection
Multimedia Tools and Applications
Hi-index | 0.10 |
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly.