Review on optical image hiding and watermarking techniques

S Jiao, C Zhou, Y Shi, W Zou, X Li - Optics & Laser Technology, 2019 - Elsevier
Abstract Information security is a critical issue in modern society and image watermarking
can effectively prevent unauthorized information access. Optical image watermarking …

A logistic map based blind and fragile watermarking for tamper detection and localization in images

AK Sahu - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
In real-time data transmission, the protection of multimedia content from unauthorized
access is pivotal. In this context, digital watermarking techniques have drawn significant …

DCT based efficient fragile watermarking scheme for image authentication and restoration

D Singh, SK Singh - Multimedia Tools and Applications, 2017 - Springer
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …

Multiplicative watermark decoder in contourlet domain using the normal inverse Gaussian distribution

H Sadreazami, MO Ahmad… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In recent years, many works on digital image watermarking have been proposed all aiming
at protection of the copyright of an image document or authentication of data. This paper …

Secured steganographic scheme for highly compressed color image using weighted matrix through DCT

P Chowdhuri, B Jana, D Giri - International Journal of Computers …, 2021 - Taylor & Francis
Due to the rapid growth of internet technology and the advent of various image processing
tools, people started using digital media for hidden communication to protect valuable …

A robust multiplicative watermarking technique for digital images in curvelet domain using normal inverse Gaussian distribution

A Shaik, MV - Multimedia Tools and Applications, 2023 - Springer
The illegal duplication of digital copies became easier because of increased communication
speed and rapid growth of internetworked multimedia systems. So it is required to …

Halftone image watermarking by content aware double-sided embedding error diffusion

Y Guo, OC Au, R Wang, L Fang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we carry out a performance analysis from a probabilistic perspective to
introduce the error diffusion-based halftone visual watermarking (EDHVW) methods' …

Binomial transform based fragile watermarking for image authentication

SK Ghosal, JK Mandal - Journal of information security and applications, 2014 - Elsevier
In this paper, a novel Binomial transform based fragile watermarking technique has been
proposed for color image authentication. Binomial transform (BT) is applied to convert each …

[HTML][HTML] Ownership protection of plenoptic images by robust and reversible watermarking

A Ansari, S Hong, G Saavedra, B Javidi… - Optics and Lasers in …, 2018 - Elsevier
Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to
the images captured by conventional cameras, plenoptic images carry a considerable …

A robust 3D point cloud watermarking method based on the graph Fourier transform

FABS Ferreira, JB Lima - Multimedia Tools and Applications, 2020 - Springer
Many modern applications make use of 3D modeling and/or reconstruction of complex
objects, such as historical monuments and entire urban centers. One of the most common …