A color image watermarking scheme based on color quantization
Signal Processing
Watermarking text document images using edge direction histograms
Pattern Recognition Letters
Image Analysis and Mathematical Morphology
Image Analysis and Mathematical Morphology
An adjusted-purpose digital watermarking technique
Pattern Recognition
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Fault resilient and compression tolerant digital signature for image authentication
IEEE Transactions on Consumer Electronics
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A remediable image authentication scheme based on feature extraction and clustered VQ
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
A high performance data integrity assurance based on the determinant technique
Future Generation Computer Systems
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A secure fragile watermarking scheme based on chaos-and-hamming code
Journal of Systems and Software
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
Hi-index | 0.01 |
Image authentication has come through a history of several years. However, up to the present time, most mainstream image authentication schemes are still unable to detect burst bit errors. Moreover, the capability of recovering tampered pixels in detail (complex) areas has not been very satisfactory either. In this paper, we offer to combine the Hamming code technique, Torus automorphism and bit rotation technique to do tamper proofing. According to our experimental results, our new hybrid method can effectively eliminate burst bit errors, and our recovered pixels in detail areas can actually gain very high clarity. The results show that our scheme is quite a practical method, which is quite able to detect and recover tampered areas.