Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

[PDF][PDF] Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection.

X Zhang, X Sun, X Sun, W Sun… - Computers, Materials & …, 2022 - cdn.techscience.cn
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.
In order to avoid the leakage of patient information in telemedicine, a two-stage reversible …

A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability

L Rakhmawati, W Wirawan, S Suwadi - EURASIP Journal on Image and …, 2019 - Springer
The rapid developments of storage technology and information exchange encourage the
development of research in the field of information security. In the process of sending …

Fragile image watermarking with pixel-wise recovery based on overlap** embedding strategy

C Qin, P Ji, X Zhang, J Dong, J Wang - Signal processing, 2017 - Elsevier
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlap** embedding strategy. The block-wise mechanism for …

A recent survey on image watermarking techniques and its application in e-governance

C Kumar, AK Singh, P Kumar - Multimedia Tools and Applications, 2018 - Springer
This survey presents a brief discussion of different aspects of digital image watermarking.
Included in the present discussion are these general concepts: major characteristics of …

Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

D Singh, SK Singh - Journal of Visual Communication and Image …, 2016 - Elsevier
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlap** block, two …

DCT based efficient fragile watermarking scheme for image authentication and restoration

D Singh, SK Singh - Multimedia Tools and Applications, 2017 - Springer
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …

Toward construction-based data hiding: from secrets to fingerprint images

S Li, X Zhang - IEEE Transactions on Image Processing, 2018 - ieeexplore.ieee.org
Data hiding usually involves the alteration of a cover signal for embedding a secret
message. In this paper, we propose a construction-based data hiding technique which …

Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction

X Zhang, Z Qian, Y Ren, G Feng - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper proposes a novel watermarking scheme with flexible self-recovery quality. The
embedded watermark data for content recovery are calculated from the original discrete …

Draw: Defending camera-shooted raw against image manipulation

X Hu, Q Ying, Z Qian, S Li… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
RAW files are the initial measurement of scene radiance widely used in most cameras, and
the ubiquitously-used RGB images are converted from RAW data through Image Signal …