Secret and public key image watermarking schemes for image authentication and ownership verification
From MaRDI portal
Publication:4420003
DOI10.1109/83.951543zbMATH Open1039.68802DBLPjournals/tip/WongM01OpenAlexW2122014146WikidataQ51893944 ScholiaQ51893944MaRDI QIDQ4420003FDOQ4420003
Authors: Ping Wah Wong, Nasir Memon
Publication date: 2001
Published in: IEEE Transactions on Image Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/83.951543
Recommendations
Cited In (24)
- A digital right management model for distribution of digital audiovisual content
- A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration
- Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
- A secure and robust hash-based scheme for image authentication
- An efficient image authentication method based on Hamming code
- Automatic image authentication and recovery using fractal code embedding and image inpainting
- Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
- A self-recovery fragile watermarking scheme for image authentication with superior localization
- Fragile watermarking scheme using a hierarchical mechanism
- Adjacent-block based statistical detection method for self-embedding watermarking techniques
- Attack and improvement of the fidelity preserved fragile watermarking of digital images
- Cryptanalysis and improvement of the robust and blind watermarking scheme for dual color image
- Designated verification of non-invertible watermark
- Time-frequency and time-scale-based fragile watermarking methods for image authentication
- A survey of watermarking algorithms for image authentication
- Reversible fragile watermarking for locating tampered blocks in JPEG images
- Wavelet packets-based digital watermarking for image verification and authentication
- A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
- Recover the tampered image based on VQ indexing
- Image ownership verification via unitary transform of conjugate quadrature filter
- Inverted pattern approach to improve image quality of information hiding by LSB substitution
- A novel image ownership protection scheme based on rehashing concept and vector quantization
- REVERSIBLE WATERMARKING ALGORITHM BASED ON WAVELET LIFTING SCHEME
- Tampering with a watermarking-based image authentication scheme
This page was built for publication: Secret and public key image watermarking schemes for image authentication and ownership verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4420003)