Secret and public key image watermarking schemes for image authentication and ownership verification

From MaRDI portal
Publication:4420003


DOI10.1109/83.951543zbMath1039.68802WikidataQ51893944 ScholiaQ51893944MaRDI QIDQ4420003

Ping Wah Wong, Nasir D. Memon

Publication date: 2001

Published in: IEEE Transactions on Image Processing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/83.951543


68P25: Data encryption (aspects in computer science)


Related Items

Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities, Time-frequency and time-scale-based fragile watermarking methods for image authentication, An efficient image authentication method based on Hamming code, Inverted pattern approach to improve image quality of information hiding by LSB substitution, A self-recovery fragile watermarking scheme for image authentication with superior localization, A secure and robust hash-based scheme for image authentication, Fragile watermarking scheme using a hierarchical mechanism, A sharing-based fragile watermarking method for authentication and self-recovery of image tampering, Adjacent-block based statistical detection method for self-embedding watermarking techniques, Recover the tampered image based on VQ indexing, Attack and improvement of the fidelity preserved fragile watermarking of digital images, Cryptanalysis and improvement of the robust and blind watermarking scheme for dual color image, Reversible fragile watermarking for locating tampered blocks in JPEG images, A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration, Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery, Automatic image authentication and recovery using fractal code embedding and image inpainting, A digital right management model for distribution of digital audiovisual content, REVERSIBLE WATERMARKING ALGORITHM BASED ON WAVELET LIFTING SCHEME