Secret and public key image watermarking schemes for image authentication and ownership verification
From MaRDI portal
Publication:4420003
DOI10.1109/83.951543zbMATH Open1039.68802DBLPjournals/tip/WongM01OpenAlexW2122014146WikidataQ51893944 ScholiaQ51893944MaRDI QIDQ4420003FDOQ4420003
Publication date: 2001
Published in: IEEE Transactions on Image Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/83.951543
Cited In (18)
- A digital right management model for distribution of digital audiovisual content
- A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration
- Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
- A secure and robust hash-based scheme for image authentication
- An efficient image authentication method based on Hamming code
- Automatic image authentication and recovery using fractal code embedding and image inpainting
- Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
- A self-recovery fragile watermarking scheme for image authentication with superior localization
- Fragile watermarking scheme using a hierarchical mechanism
- Adjacent-block based statistical detection method for self-embedding watermarking techniques
- Attack and improvement of the fidelity preserved fragile watermarking of digital images
- Cryptanalysis and improvement of the robust and blind watermarking scheme for dual color image
- Time-frequency and time-scale-based fragile watermarking methods for image authentication
- Reversible fragile watermarking for locating tampered blocks in JPEG images
- A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
- Recover the tampered image based on VQ indexing
- Inverted pattern approach to improve image quality of information hiding by LSB substitution
- REVERSIBLE WATERMARKING ALGORITHM BASED ON WAVELET LIFTING SCHEME
Recommendations
- A survey of watermarking algorithms for image authentication π π
- Watermarking in secure image retrieval π π
- Multipurpose watermarking for image authentication and protection π π
- Title not available (Why is that?) π π
- Authentication and recovery of images using multiple watermarks π π
This page was built for publication: Secret and public key image watermarking schemes for image authentication and ownership verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4420003)