Digital image and video watermarking: methodologies, attacks, applications, and future directions
In recent years, internet technology has grown in advance, and multimedia data-sharing
growth rates have skyrocketed. As a result, protecting multimedia data in digital networks …
growth rates have skyrocketed. As a result, protecting multimedia data in digital networks …
A fragile image watermarking scheme in dwt domain using chaotic sequences and error-correcting codes
AM Ramos, JAP Artiles, DPB Chaves, C Pimentel - Entropy, 2023 - mdpi.com
With the rapid development of digital signal processing tools, image contents can be easily
manipulated or maliciously tampered with. Fragile watermarking has been largely used for …
manipulated or maliciously tampered with. Fragile watermarking has been largely used for …
[HTML][HTML] TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
This paper proposed two evaluation metrics of the tamper coincidence in a block map
design for image watermarking. These evaluation metrics are called Tamper Coincidence …
design for image watermarking. These evaluation metrics are called Tamper Coincidence …
Detection and recovery of higher tampered images using novel feature and compression strategy
Due to the availability of powerful image-editing software and the growing amount of
multimedia data that is transmitted via the Internet, integrity verifications and confidentiality of …
multimedia data that is transmitted via the Internet, integrity verifications and confidentiality of …
Multipurpose image watermarking: ownership check, tamper detection and self-recovery
In the present digital scenario, false ownership claims and tampering with digital data have
become serious concerns for users. There have been a very few schemes proposed in the …
become serious concerns for users. There have been a very few schemes proposed in the …
Watermarking approach for source authentication of web content in online social media: a systematic literature review
M Shaliyar, K Mustafa - Multimedia Tools and Applications, 2024 - Springer
Abstract Online Social Media (OSM) enables users to create a powerful virtual bond that
facilitates global forwarding/sharing of messages, decision-making, analysis, or voting …
facilitates global forwarding/sharing of messages, decision-making, analysis, or voting …
[HTML][HTML] AuSR3: A new block map** technique for image authentication and self-recovery to avoid the tamper coincidence problem
This paper proposes a new block map** technique for image authentication and self-
recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper …
recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper …
Detection and localization of image tampering in digital images with fused features
In digital forensics, image tamper detection and localization have attracted increased
attention in recent days, where the standard methods have limited description ability and …
attention in recent days, where the standard methods have limited description ability and …
Nested block based double self-embedding fragile image watermarking with super-resolution recovery
N Rijati - IEEE Access, 2023 - ieeexplore.ieee.org
Self-recovery capability is challenging in develo** fragile watermarking alongside
authentication and tamper localization. In certain situations, authentication and tamper …
authentication and tamper localization. In certain situations, authentication and tamper …
[HTML][HTML] A chaotic-based watermarking scheme for ensuring integrity of a face recognition system in public large gathering scenario
BS Alhazmi, O Benrhouma, AN AlHassan… - Journal of King Saud …, 2023 - Elsevier
Secure data transmission is critical in public video surveillance applications such as tracking
missing persons in large crowd gatherings. It may help the security personnel to monitor & …
missing persons in large crowd gatherings. It may help the security personnel to monitor & …