Digital image integrity–a survey of protection and verification techniques
P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …
computational imaging and adoption of artificial intelligence have spawned new editing …
[PDF][PDF] Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection.
X Zhang, X Sun, X Sun, W Sun… - Computers, Materials & …, 2022 - cdn.techscience.cn
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.
In order to avoid the leakage of patient information in telemedicine, a two-stage reversible …
In order to avoid the leakage of patient information in telemedicine, a two-stage reversible …
A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability
The rapid developments of storage technology and information exchange encourage the
development of research in the field of information security. In the process of sending …
development of research in the field of information security. In the process of sending …
Fragile image watermarking with pixel-wise recovery based on overlap** embedding strategy
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlap** embedding strategy. The block-wise mechanism for …
capability based on overlap** embedding strategy. The block-wise mechanism for …
A recent survey on image watermarking techniques and its application in e-governance
This survey presents a brief discussion of different aspects of digital image watermarking.
Included in the present discussion are these general concepts: major characteristics of …
Included in the present discussion are these general concepts: major characteristics of …
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlap** block, two …
recoverable fragile watermarking scheme. For each 2× 2 non-overlap** block, two …
DCT based efficient fragile watermarking scheme for image authentication and restoration
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …
restoration are very essential, especially when it is utilized in forensic science, medical …
Toward construction-based data hiding: from secrets to fingerprint images
Data hiding usually involves the alteration of a cover signal for embedding a secret
message. In this paper, we propose a construction-based data hiding technique which …
message. In this paper, we propose a construction-based data hiding technique which …
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
This paper proposes a novel watermarking scheme with flexible self-recovery quality. The
embedded watermark data for content recovery are calculated from the original discrete …
embedded watermark data for content recovery are calculated from the original discrete …
Draw: Defending camera-shooted raw against image manipulation
RAW files are the initial measurement of scene radiance widely used in most cameras, and
the ubiquitously-used RGB images are converted from RAW data through Image Signal …
the ubiquitously-used RGB images are converted from RAW data through Image Signal …