A survey of watermarking algorithms for image authentication

C Rey, JL Dugelay - EURASIP Journal on Advances in Signal Processing, 2002 - Springer
Digital image manipulation software is now readily available on personal computers. It is
therefore very simple to tamper with any image and make it available to others. Insuring …

[PDF][PDF] A review of fragile image watermarks

ET Lin, EJ Delp - … of the ACM Multimedia Security Workshop, 1999 - publica.fraunhofer.de
Many image watermarks have been proposed to protect intellectual property in an age
where digital images may be easily modified and perfectly reproduced. In a fragile marking …

Invertible authentication

J Fridrich, M Goljan, R Du - Security and Watermarking of …, 2001 - spiedigitallibrary.org
In this paper, we present two new methods for authentication of digital images using
invertible watermarking. While virtually all watermarking schemes introduce some small …

A hierarchical digital watermarking method for image tamper detection and recovery

PL Lin, CK Hsieh, PW Huang - Pattern recognition, 2005 - Elsevier
In this paper, we present an efficient and effective digital watermarking method for image
tamper detection and recovery. Our method is efficient as it only uses simple operations …

Images with self-correcting capabilities

J Fridrich, M Goljan - Proceedings 1999 International …, 1999 - ieeexplore.ieee.org
In this paper, we introduce two techniques for self-embedding an image in itself as a means
for protecting the image content. After self-embedding, it is possible to recover portions of the …

Advanced wireless networks: 4G technologies

S Glisic, JP Makela - 2006 IEEE Ninth International Symposium …, 2006 - ieeexplore.ieee.org
Within the wide range of issues related to 4G wireless networks, due to the scope of the
ISSTA conference, in this presentation we highlight some segments of wireless networks …

Detection of image alterations using semifragile watermarks

ET Lin, CI Podilchuk, EJ Delp III - Security and Watermarking of …, 2000 - spiedigitallibrary.org
Digital watermarking research has generally focused upon two classes of watermarks,
fragile and robust. Robust watermarks are designed to be detected even after attempts are …

Reconstructing an image from its local descriptors

P Weinzaepfel, H Jégou, P Pérez - CVPR 2011, 2011 - ieeexplore.ieee.org
This paper shows that an image can be approximately reconstructed based on the output of
a blackbox local description software such as those classically used for image indexing. Our …

Invisibility and application functionalities in perceptual watermarking an overview

C De Vleeschouwer, JF Delaigle… - Proceedings of the …, 2002 - ieeexplore.ieee.org
Digital watermarking consists of hiding subliminal information into digital media content, also
called host data. It can be the basis of many applications, including security and media asset …

Security of fragile authentication watermarks with localization

J Fridrich - Security and Watermarking of Multimedia Contents …, 2002 - spiedigitallibrary.org
In this paper, we study the security of fragile image authentication watermarks that can
localize tampered areas. We start by comparing the goals, capabilities, and advantages of …