Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Detection and restoration of tampered JPEG compressed images
Journal of Systems and Software
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Fast copy-move forgery detection
WSEAS Transactions on Signal Processing
Dual digital watermarking for internet media based on hybrid strategies
IEEE Transactions on Circuits and Systems for Video Technology
Multimedia Tools and Applications
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
Computer Standards & Interfaces
Tamper-proof image watermarking using self-embedding
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Hi-index | 0.00 |
This paper presents a novel color image watermarking scheme for both tamper detection and tampered image recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. In the tamper detection process, instead of independently examining each embedded authentication data, we take all the authentication data embedded in an image into account and utilize a majority-voting technique to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively thwart collage attack and vector quantization (VQ) attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully recovered with acceptable visual quality.