A recent survey of reversible watermarking techniques
The art of secretly hiding and communicating information has gained immense importance
in the last two decades due to the advances in generation, storage, and communication …
in the last two decades due to the advances in generation, storage, and communication …
A review paper on digital image forgery detection techniques
NK Gill, R Garg, EA Doegar - 2017 8th international conference …, 2017 - ieeexplore.ieee.org
These days digital image forgery has turned out to be unsophisticated because of capable
PCs, propelled image editing softwares and high resolution capturing gadgets. Checking the …
PCs, propelled image editing softwares and high resolution capturing gadgets. Checking the …
An effective SVD-based image tampering detection and self-recovery using active watermarking
In this paper, an effective tamper detection and self-recovery algorithm based on singular
value decomposition (SVD) is proposed. This method generates two distinct tamper …
value decomposition (SVD) is proposed. This method generates two distinct tamper …
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
This paper proposes a novel watermarking scheme with flexible self-recovery quality. The
embedded watermark data for content recovery are calculated from the original discrete …
embedded watermark data for content recovery are calculated from the original discrete …
Intelligent reversible watermarking in integer wavelet domain for medical images
The prime requirement of reversible watermarking scheme is that the system should be able
to restore the cover work to its original state after extracting the hidden information …
to restore the cover work to its original state after extracting the hidden information …
Fragile watermarking schemes for image authentication: a survey
K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …
proposed in the past decade. The limited embedding capacity and extent of tampering are …
Genetic algorithm and difference expansion based reversible watermarking for relational databases
In this paper, we present a new robust and reversible watermarking approach for the
protection of relational databases. Our approach is based on the idea of difference …
protection of relational databases. Our approach is based on the idea of difference …
A novel color image tampering detection and self-recovery based on fragile watermarking
X **a, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …
Recolored image detection via a deep discriminative model
Image recoloring is a technique that can transfer image color or theme and result in an
imperceptible change in human eyes. Although image recoloring is one of the most …
imperceptible change in human eyes. Although image recoloring is one of the most …
A source-channel coding approach to digital image protection and self-recovery
Watermarking algorithms have been widely applied to the field of image forensics recently.
One of these very forensic applications is the protection of images against tampering. For …
One of these very forensic applications is the protection of images against tampering. For …