Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2023
A secure pixel level self-recovery scheme for digital images
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 44, Issue 3Pages 4481–4493https://doi.org/10.3233/JIFS-221245This paper presents a secure image authentication scheme for tamper localization and recovery at pixel level. The proposed scheme encrypts the watermark comprising tamper localization code and self-recovery code using chaotic sequence to ensure security. ...
- research-articleNovember 2022
A Robust Image Watermarking Algorithm Based on Content Authentication and Intelligent Optimization
ICCCV '22: Proceedings of the 5th International Conference on Control and Computer VisionPages 164–170https://doi.org/10.1145/3561613.3561639Aiming at some shortcomings of current digital watermarking algorithms, a color image double watermarking algorithm based on content authentication and machine learning is proposed in this paper. Firstly, the algorithm combines discrete wavelet ...
- research-articleJune 2022
A Fragile Watermarking Algorithm Based on Multiple Watermarking
IVSP '22: Proceedings of the 2022 4th International Conference on Image, Video and Signal ProcessingPages 48–55https://doi.org/10.1145/3531232.3531239A fragile watermarking algorithm based on multiple watermarking is proposed. Watermarking generation: First, divide the image into block, and generate an authentication watermarking and two average watermarking based on their average value. Then, use ...
- research-articleJanuary 2022
A comprehensive study of watermarking schemes for 3D polygon mesh objects
International Journal of Information and Computer Security (IJICS), Volume 19, Issue 1-2Pages 48–72https://doi.org/10.1504/ijics.2022.126753Three-dimensional (3D) objects have been used in machine design, architecture design, entertainment, cultural heritage, medical field, etc. during the last two decades. Increasing trends of 3D objects attract the researcher, academician, and industry ...
- research-articleJanuary 2021
A complexity reduced and reliable integrity protection for large relational data over clouds
- Waqas Haider,
- Muhammad Wasif Nisar,
- Tanzila Saba,
- Muhammad Sharif,
- Raja Umair Haider,
- Nadeem Muhammad Bilal,
- Muhammad Attique Khan
International Journal of Information and Computer Security (IJICS), Volume 15, Issue 1Pages 49–66https://doi.org/10.1504/ijics.2021.115347At present, governments and private business operations are highly dependent on relational data applications such as bank accounts, citizen registration, etc. These relational data dependent operations require reliable integrity protection while utilising ...
-
- research-articleDecember 2016
A context dependent fragile watermarking scheme for tamper detection from demosaicked color images
ICVGIP '16: Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image ProcessingArticle No.: 61, Pages 1–8https://doi.org/10.1145/3009977.3009987Fragile watermarking schemes are very common in practice for tamper detection and image authentication. In this paper, we propose a new fragile watermarking scheme to detect common image tampering operations such as copy and paste attack and image ...
- articleSeptember 2016
A recoverable chaos-based fragile watermarking with high PSNR preservation
Security and Communication Networks (SACN), Volume 9, Issue 14Pages 2371–2386https://doi.org/10.1002/sec.1504The preservation of high peak signal-to-noise ratio of the watermarked image is required in some applications. The chaos-based fragile watermarking proposed by Rawat et al. in 2011 can meet this requirement, for only one LSB plane of the original image ...
- research-articleJuly 2015
A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery
IEEE Transactions on Image Processing (TIP), Volume 24, Issue 7Pages 2266–2277https://doi.org/10.1109/TIP.2015.2414878Watermarking algorithms have been widely applied to the field of image forensics recently. One of these very forensic applications is the protection of images against tampering. For this purpose, we need to design a watermarking algorithm fulfilling two ...
- ArticleAugust 2014
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism
IIH-MSP '14: Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingPages 130–133https://doi.org/10.1109/IIH-MSP.2014.39In this paper, an effective self-embedding fragile watermarking method for tampering detection and content recovery is proposed. The halftone mechanism and the extension operation are utilized to generate recovery bits from the resized original image. ...
- research-articleJune 2014
A digital watermarking scheme for image tamper detection
CompSysTech '14: Proceedings of the 15th International Conference on Computer Systems and TechnologiesPages 100–107https://doi.org/10.1145/2659532.2659597In recent years, various fragile watermarking schemes have been proposed for image authentication and tamper detection. In this paper, a chaotic map based watermarking scheme is proposed. The periodic nature of the Arnold's cat chaotic map is researched ...
- research-articleApril 2014
Protecting the Content Integrity of Digital Imagery with Fidelity Preservation: An Improved Version
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 10, Issue 3Article No.: 29, Pages 1–5https://doi.org/10.1145/2568224Fragile watermarking has attracted a lot of attention in the last decade. An interesting approach, presented in 2011 by Lin et al., results in very high quality of the watermarked images. However, after a thorough examination of the paper, a few ...
- ArticleJune 2013
A spherical coordinate based fragile watermarking scheme for 3D models
IEA/AIE'13: Proceedings of the 26th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent SystemsPages 566–571https://doi.org/10.1007/978-3-642-38577-3_58In this paper, a new spherical coordinate based fragile watermarking scheme is proposed. At first, the three dimensional (3D) model is translated from the Cartesian coordinate system to the spherical coordinate system. Then the quantization index ...
- ArticleOctober 2012
Self-embedding fragile watermarking scheme combined average with VQ encoding
IWDW'12: Proceedings of the 11th international conference on Digital Forensics and WatermakingPages 120–134https://doi.org/10.1007/978-3-642-40099-5_11Combined average encoding with vector quantization (VQ) encoding, a new self-embedding fragile watermarking scheme is proposed. To take into account watermark payload, localization accuracy and recovery quality, the 6-bit average-watermark of a 2×2 ...
- ArticleOctober 2012
Improved Web Page Watermarking
ICMECG '12: Proceedings of the 2012 International Conference on Management of e-Commerce and e-GovernmentPages 98–102https://doi.org/10.1109/ICMeCG.2012.78Web Page Watermarking is a research branch of the text watermarking. It is relatively difficult to embed the watermarking into the Web Page. For the particularity of the Web Page, this paper proposes an effectively improved Web Page Watermarking program ...
- ArticleJuly 2012
Detection of Tampering in Speech Signals with Inaudible Watermarking Technique
IIH-MSP '12: Proceedings of the 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal ProcessingPages 118–121https://doi.org/10.1109/IIH-MSP.2012.34There have recently been serious social issues involved in multimedia signal processing such as malicious attacks and tampering with digital audio/speech signals. Fragile speech watermarking is a technique that enables the detection of tampering with ...
- ArticleJune 2012
A fragile watermarking scheme based CRC checksum and public key cryptosystem for RGB color image authentication
ICISP'12: Proceedings of the 5th international conference on Image and Signal ProcessingPages 316–325https://doi.org/10.1007/978-3-642-31254-0_36The increased use of multimedia applications pose more problems concerning the preservation of confidentiality and authenticity of the transmission of digital data. These data, in particular the images should be protected from tampering. The solution is ...
- ArticleJune 2012
Fragile Watermarking Scheme for Image Authentication
HSI '12: Proceedings of the 2012 5th International Conference on Human System InteractionsPages 168–174https://doi.org/10.1109/HSI.2012.32In this paper, we propose a fragile watermarking scheme in wavelet domain which is sensitive to all kinds of modifications and has the ability to localize the tampered regions. The proposed scheme is a key-dependent, content based and non-deterministic ...
- ArticleOctober 2011
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11: Proceedings of the 10th international conference on Digital-Forensics and WatermarkingPages 142–155https://doi.org/10.1007/978-3-642-32205-1_13To take into account security, invisibility and recovery quality, this work proposes a variable-payload self-recovery fragile watermarking scheme. For each block, the watermarks include the total-watermark with variable number of bits and the basic-...
- ArticleOctober 2011
A Hybrid Watermarking Technique to Resist Tampering and Copy Attacks
IPTC '11: Proceedings of the 2011 2nd International Symposium on Intelligence Information Processing and Trusted ComputingPages 111–114https://doi.org/10.1109/IPTC.2011.35Digital watermarking is an efficient method to protect multimedia documents. Robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection. Fragile watermarks, which are vulnerable ...
- research-articleSeptember 2011
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 7, Issue 3Article No.: 15, Pages 1–20https://doi.org/10.1145/2000486.2000489Fragile watermarking is applied to protect the content integrity of digital images. The main concerns related to watermarking include retaining the quality of the watermarked image and retaining the ability to detect whether any manipulation has ...