Fragile watermarking schemes for image authentication: a survey
- 2 March 2017
- journal article
- research article
- Published by Springer Science and Business Media LLC in International Journal of Machine Learning and Cybernetics
- Vol. 9 (7), 1193-1218
- https://doi.org/10.1007/s13042-017-0641-4
Abstract
No abstract availableKeywords
This publication has 64 references indexed in Scilit:
- A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structureComputers and Electrical Engineering, 2011
- A secure fragile watermarking scheme based on chaos-and-hamming codeJournal of Systems and Software, 2011
- Protecting the content integrity of digital imagery with fidelity preservationACM Transactions on Multimedia Computing, Communications, and Applications, 2011
- Dual watermark for image tamper detection and recoveryPattern Recognition, 2008
- Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recoveryPattern Recognition, 2008
- Automatic image authentication and recovery using fractal code embedding and image inpaintingPattern Recognition, 2008
- A majority-voting based watermarking scheme for color image tamper detection and recoveryComputer Standards & Interfaces, 2007
- An efficient image authentication method based on Hamming codePattern Recognition, 2007
- Wavelet-based fragile watermarking scheme for image authenticationJournal of Electronic Imaging, 2007
- A hierarchical digital watermarking method for image tamper detection and recoveryPattern Recognition, 2005