An Adaptive Curvelet Based Semi-Fragile Watermarking Scheme for Effective and Intelligent Tampering Classification and Recovery of Digital Images

[1]  E. Candès,et al.  New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities , 2004 .

[2]  Nilanjan Dey,et al.  Tamper detection of electrocardiographic signal using watermarked bio–hash code in wireless cardiology , 2015 .

[3]  Nilanjan Dey,et al.  High Payload Watermarking using Residue Number System , 2015 .

[4]  Prabhishek Singh,et al.  A Survey of Digital Watermarking Techniques, Applications and Attacks , 2013 .

[5]  Robyn A. Owens,et al.  Feature detection from local energy , 1987, Pattern Recognit. Lett..

[6]  Yoshinao Aoki,et al.  Watermarking technique using computer‐generated holograms , 2001 .

[7]  Jana Dittmann,et al.  Hologram watermarks for document authentications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[8]  Ajith Abraham,et al.  Computational Intelligence in Digital Forensics , 2014, Computational Intelligence in Digital Forensics.

[9]  Yun-Qing Shi,et al.  Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet , 2006 .

[10]  Xiangyang Wang,et al.  A feature-based robust digital image watermarking scheme using bandelet transform , 2011 .

[11]  Mohamed-Jalal Fadili,et al.  Numerical Issues When Using Wavelets , 2009, Encyclopedia of Complexity and Systems Science.

[12]  David Zhang,et al.  FSIM: A Feature Similarity Index for Image Quality Assessment , 2011, IEEE Transactions on Image Processing.

[13]  Shing-Chi Cheung,et al.  The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..

[14]  Vishal Shrivastava,et al.  A Novel Digital Watermarking Technique based on Feature Attribute Selection using Integer Wavelet Transform Function and ID3 Algorithm , 2014 .

[15]  Giuseppe Schirripa Spagnolo,et al.  Fragile digital watermarking by synthetic holograms , 2004, SPIE Security + Defence.

[16]  Riyad Alshammari,et al.  Using Neuro-Fuzzy Approach to Reduce False Positive Alerts , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).

[17]  Jiwu Huang,et al.  Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform , 2005, DRMTICS.

[18]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..

[19]  Nilanjan Dey,et al.  Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method , 2012, SIN '12.

[20]  D. Burr,et al.  Mach bands are phase dependent , 1986, Nature.

[21]  Lakhmi C. Jain,et al.  Intelligent Watermarking Techniques: (With CD-ROM) , 2004 .

[22]  Pao-Ta Yu,et al.  Digital watermarking based on neural networks for color images , 2001, Signal Process..

[23]  Nidhi Chandrakar,et al.  Study and comparison of various image edge detection techniques , 2012 .

[24]  Long-Wen Chang,et al.  Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments , 2010, 2010 10th International Symposium on Communications and Information Technologies.

[25]  S. Nirmala,et al.  A New Curvelet Based Blind Semi-fragile Watermarking Scheme for Authentication and Tamper Detection of Digital Images , 2016 .

[26]  V. Groza,et al.  A dynamic fuzzy logic approach to adaptive HVS-based watermarking , 2005, IEEE International Workshop on Haptic Audio Visual Environments and their Applications.

[27]  Jaejin Lee,et al.  A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..

[28]  Luc Van Gool,et al.  Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..

[29]  N. Dey,et al.  Feature analysis for the reversible watermarked electrooculography signal using Low distortion Prediction-error Expansion , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).

[30]  Nilanjan Dey,et al.  Reversible Color Image Watermarking Using Trigonometric Functions , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[31]  D. Burr,et al.  Feature detection in human vision: a phase-dependent energy model , 1988, Proceedings of the Royal Society of London. Series B. Biological Sciences.

[32]  Xingyuan Wang,et al.  A novel image recovery method based on discrete cosine transform and matched blocks , 2013 .

[33]  Sheli Sinha Chaudhuri,et al.  Lifting Wavelet Transformation based blind watermarking technique of Photoplethysmographic signals in wireless telecardiology , 2012, 2012 World Congress on Information and Communication Technologies.

[34]  Nilanjan Dey,et al.  Particle Swarm Optimization based parameter optimization technique in medical information hiding , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.

[35]  Ingemar J. Cox,et al.  Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[36]  Chang-Tsun Li Multimedia Forensics and Security , 2008 .

[37]  Desmond C. McLernon,et al.  Using Curvelet transform for watermarking based on amplitude modulation , 2013, Signal, Image and Video Processing.

[38]  Yun Q. Shi,et al.  A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[39]  Lianping Chen,et al.  Effects of different Gabor filters parameters on image retrieval by texture , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[40]  Jeng-Shyang Pan,et al.  Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..

[41]  N. Dey,et al.  DWT-DCT-SVD based intravascular ultrasound video watermarking , 2012, 2012 World Congress on Information and Communication Technologies.

[42]  Edward K. Wong,et al.  Recent developments in document image watermarking and data hiding , 2001, SPIE ITCom.

[43]  Laurent Demanet,et al.  Fast Discrete Curvelet Transforms , 2006, Multiscale Model. Simul..

[44]  Chun-Shien Lu,et al.  Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property , 2004 .

[45]  Ming-Shi Wang,et al.  A fuzzy c-means clustering-based fragile watermarking scheme for image authentication , 2009, Expert Syst. Appl..