A recent survey of reversible watermarking techniques

A Khan, A Siddiqa, S Munib, SA Malik - Information sciences, 2014 - Elsevier
The art of secretly hiding and communicating information has gained immense importance
in the last two decades due to the advances in generation, storage, and communication …

A review paper on digital image forgery detection techniques

NK Gill, R Garg, EA Doegar - 2017 8th international conference …, 2017 - ieeexplore.ieee.org
These days digital image forgery has turned out to be unsophisticated because of capable
PCs, propelled image editing softwares and high resolution capturing gadgets. Checking the …

An effective SVD-based image tampering detection and self-recovery using active watermarking

S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien… - Signal Processing …, 2014 - Elsevier
In this paper, an effective tamper detection and self-recovery algorithm based on singular
value decomposition (SVD) is proposed. This method generates two distinct tamper …

Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction

X Zhang, Z Qian, Y Ren, G Feng - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper proposes a novel watermarking scheme with flexible self-recovery quality. The
embedded watermark data for content recovery are calculated from the original discrete …

Intelligent reversible watermarking in integer wavelet domain for medical images

M Arsalan, SA Malik, A Khan - Journal of Systems and Software, 2012 - Elsevier
The prime requirement of reversible watermarking scheme is that the system should be able
to restore the cover work to its original state after extracting the hidden information …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …

Genetic algorithm and difference expansion based reversible watermarking for relational databases

K Jawad, A Khan - Journal of Systems and Software, 2013 - Elsevier
In this paper, we present a new robust and reversible watermarking approach for the
protection of relational databases. Our approach is based on the idea of difference …

A novel color image tampering detection and self-recovery based on fragile watermarking

X **a, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …

Recolored image detection via a deep discriminative model

Y Yan, W Ren, X Cao - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Image recoloring is a technique that can transfer image color or theme and result in an
imperceptible change in human eyes. Although image recoloring is one of the most …

A source-channel coding approach to digital image protection and self-recovery

S Sarreshtedari, MA Akhaee - IEEE transactions on image …, 2015 - ieeexplore.ieee.org
Watermarking algorithms have been widely applied to the field of image forensics recently.
One of these very forensic applications is the protection of images against tampering. For …