Tampering with a watermarking-based image authentication scheme
Open Access
- 30 November 2008
- journal article
- Published by Elsevier BV in Pattern Recognition
- Vol. 41 (11), 3493-3496
- https://doi.org/10.1016/j.patcog.2008.05.009
Abstract
No abstract availableThis publication has 24 references indexed in Scilit:
- Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recoveryPattern Recognition, 2008
- Speaker identification security improvement by means of speech watermarkingPattern Recognition, 2007
- A novel image watermarking scheme based on amplitude attackPattern Recognition, 2007
- Joint near-lossless compression and watermarking of still images for authentication and tamper localizationSignal Processing: Image Communication, 2006
- A watermarking-based image ownership and tampering authentication schemePattern Recognition Letters, 2006
- Quickly tracing detection for spread spectrum watermark based on effect estimation of the affine transformPattern Recognition, 2005
- A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selectionPattern Recognition, 2005
- A data-hiding technique with authentication, integration, and confidentiality for electronic patient recordsIEEE Transactions on Information Technology in Biomedicine, 2002
- Hierarchical watermarking for secure image authentication with localizationIEEE Transactions on Image Processing, 2002
- Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implicationsIEEE Journal on Selected Areas in Communications, 1998