A novel hash function based fragile watermarking method for image integrity
暂无分享,去创建一个
[1] Hussain Al-Ahmad,et al. A reversible watermarking scheme for ownership protection and authentication of medical Images , 2017, 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA).
[2] Gaurav Agarwal,et al. Tamper Detection Using Fragile Image Watermarking Based on Chaotic System , 2018 .
[3] M. Sasikumar,et al. A Benchmark for Medical Image Watermarking , 2007, 2007 14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services.
[4] Xiao Zhou,et al. Fragile Watermarking Based on LBP for Blind Tamper Detection in Images , 2017, J. Inf. Process. Syst..
[5] Rajib Kumar Jha,et al. Significant region based robust watermarking scheme in lifting wavelet transform domain , 2015, Expert Syst. Appl..
[6] Amit Kumar Singh,et al. Wavelet Based Image Watermarking: Futuristic Concepts in Information Security , 2014, Proceedings of the National Academy of Sciences, India Section A: Physical Sciences.
[7] Güzin Ulutas,et al. A New Medical Image Watermarking Technique with Finer Tamper Localization , 2017, Journal of Digital Imaging.
[8] Mei Yu,et al. New fragile watermarking method for stereo image authentication with localization and recovery , 2015 .
[9] Xinpeng Zhang,et al. Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..
[10] Bravo-SolorioSergio,et al. Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011 .
[11] V. Santhi,et al. Spatial Domain Blind Watermarking for Digital Images , 2018 .
[12] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[13] Sahib Khan,et al. On combining MD5 for image authentication using LSB substitution in selected pixels , 2018, 2018 International Conference on Engineering and Emerging Technologies (ICEET).
[14] Yun Q. Shi,et al. Reversible Data Hiding , 2003, IWDW.
[15] Hong Heather Yu,et al. Classification of video tampering methods and countermeasures using digital watermarking , 2001, SPIE ITCom.
[16] Hussain Al-Ahmad,et al. A New Watermarking Algorithm for Color Satellite Images Using Color Logos and Hash Functions , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[17] Malay Kumar Kundu,et al. Effective management of medical information through ROI-lossless fragile image watermarking technique , 2013, Comput. Methods Programs Biomed..
[18] Amit Kumar Singh,et al. Robust and Secure Multiple Watermarking Technique for Application in Tele-Ophthalmology , 2017 .
[19] Chin-Chen Chang,et al. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..
[20] Qingtang Su,et al. Robust color image watermarking technique in the spatial domain , 2018, Soft Comput..
[21] Chinchen Chang,et al. A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain , 2016 .
[22] Asoke K. Nandi,et al. Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011, Signal Process..
[23] Ronald M. Summers,et al. ChestX-ray: Hospital-Scale Chest X-ray Database and Benchmarks on Weakly Supervised Classification and Localization of Common Thorax Diseases , 2019, Deep Learning and Convolutional Neural Networks for Medical Imaging and Clinical Informatics.
[24] Sung-Hwan Jung,et al. A survey of watermarking techniques applied to multimedia , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).
[25] A. K. Pal,et al. A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection , 2017, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.
[26] C-C Chang,et al. Novel image authentication scheme based on quadtree segmentation , 2005 .
[27] Majid Mollaeefar,et al. An improved method for digital image fragile watermarking based on chaotic maps , 2017, Multimedia Tools and Applications.
[28] Veysel Aslantas,et al. DWT-SVD based image watermarking using Particle Swarm Optimizer , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[29] Nidhi H. Divecha,et al. A Feature-Based Semi-fragile Watermarking Algorithm for Digital Color Image Authentication Using Hybrid Transform , 2018 .
[30] V. Kamakshi Prasad,et al. Fragile watermarking schemes for image authentication: a survey , 2017, International Journal of Machine Learning and Cybernetics.
[31] Jean-Yves Chouinard,et al. Optimal Image Watermarking Algorithm Based on LWT-SVD via Multi-objective Ant Colony Optimization , 2011, J. Inf. Hiding Multim. Signal Process..
[32] Hou Jian-jun. DCT-Domain Fragile Watermarking Algorithm Based on Logistic Maps , 2006 .
[33] Shu-Fen Tu,et al. Probability-based tampering detection scheme for digital images , 2010 .
[34] Zhoufeng Liu,et al. Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication , 2014, Multimedia Tools and Applications.
[35] V. Aslantaş,et al. Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms , 2009 .
[36] Saban Ozer,et al. A novel fragile watermarking based on Particle Swarm Optimization , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[37] J. K. Mandal,et al. Binomial transform based fragile watermarking for image authentication , 2014, J. Inf. Secur. Appl..
[38] Durgesh Singh,et al. DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.
[39] Saban Ozer,et al. A Novel Clonal Selection Algorithm Based Fragile Watermarking Method , 2007, ICARIS.
[40] ماجد جبار جواد الفنهراوي. A semi-Fragile Watermarking Based Image Authentication , 2017 .
[41] Chang-Tsun Li,et al. Wavelet-based fragile watermarking scheme for image authentication , 2007, J. Electronic Imaging.
[42] Dilip Kumar Shaw,et al. Experimental Studies of LSB Watermarking with Different Noise , 2015 .
[43] P. P. Deepthi,et al. An Integrity Verification System for Images Using Hashing and Watermarking , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[44] Puvvadi Aparna,et al. An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm , 2018, J. Intell. Syst..
[45] Prabhishek Singh,et al. A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .
[46] Xinpeng Zhang,et al. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..
[47] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[48] Mingquan Zhou,et al. A novel SVD and LS-SVM combination algorithm for blind watermarking , 2014, Neurocomputing.
[49] Chin-Chen Chang,et al. Fragile image watermarking scheme based on VQ index sharing and self-embedding , 2015, Multimedia Tools and Applications.
[50] Amit Kumar Singh,et al. A recent survey on image watermarking techniques and its application in e-governance , 2018, Multimedia Tools and Applications.
[51] Gang Wang,et al. A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition , 2016, Multimedia Tools and Applications.
[52] Xinpeng Zhang,et al. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..
[53] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..
[54] Tung-Shou Chen,et al. An efficient reversible image authentication method using improved PVO and LSB substitution techniques , 2017, Signal Process. Image Commun..
[55] Suneeta Agarwal,et al. A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.
[56] Millie Pant,et al. An efficient lossless robust watermarking scheme by integrating redistributed invariant wavelet and fractional Fourier transforms , 2018, Multimedia Tools and Applications.
[57] Zhongmeng Zhao,et al. Self-embedding fragile watermarking based on DCT and fast fractal coding , 2014, Multimedia Tools and Applications.
[58] Wu-Lin Chen,et al. Probability-based reversible image authentication scheme for image demosaicking , 2016, Future Gener. Comput. Syst..
[59] Bin Ma,et al. Multi-block dependency based fragile watermarking scheme for fingerprint images protection , 2013, Multimedia Tools and Applications.
[60] Amit Kumar Singh,et al. Iris based secure NROI multiple eye image watermarking for teleophthalmology , 2016, Multimedia Tools and Applications.
[61] Jasni Mohamad Zain,et al. Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images , 2017, Journal of Digital Imaging.