Journal ArticleDOI
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
Reads0
Chats0
TLDR
Experimental results show that the proposed scheme provides high restoration quality and, due to the low embedding volume, the visual quality of the watermarked image is satisfactory.About:
This article is published in Signal Processing.The article was published on 2012-04-01. It has received 110 citations till now. The article focuses on the topics: Contourlet & Block (data storage).read more
Citations
More filters
Journal ArticleDOI
Robust Image Hashing With Ring Partition and Invariant Vector Distance
TL;DR: This work incorporates ring partition and invariant vector distance to image hashing algorithm for enhancing rotation robustness and discriminative capability, and demonstrates that the proposed hashing algorithm is robust at commonly used digital operations to images.
Journal ArticleDOI
Robust Perceptual Image Hashing Based on Ring Partition and NMF
TL;DR: An efficient image hashing with a ring partition and a nonnegative matrix factorization (NMF) is designed, which has both the rotation robustness and good discriminative capability.
Journal ArticleDOI
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
TL;DR: A new fragile watermarking scheme with high-quality recovery capability based on overlapping embedding strategy that can achieve better quality of recovered image compared with some of state-of-the-art schemes.
Journal ArticleDOI
Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
Durgesh Singh,Sanjay Singh +1 more
TL;DR: The experimental results demonstrate that the proposed DCT based effective self-recoverable fragile watermarking scheme not only outperforms high-quality restoration effectively, but also removes the blocking artifacts and improves the accuracy of tamper localization due to the use of very small size blocks, smoothing function and two levels tampering detection mechanisms.
Journal ArticleDOI
Robust Image Hashing with Tensor Decomposition
TL;DR: A stable three-order tensor is first constructed from the normalized image, so as to enhance the robustness of the TD hashing, where image hash generation is viewed as deriving a compact representation from a tensor.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI
The Nonsubsampled Contourlet Transform: Theory, Design, and Applications
TL;DR: This paper proposes a design framework based on the mapping approach, that allows for a fast implementation based on a lifting or ladder structure, and only uses one-dimensional filtering in some cases.
Proceedings ArticleDOI
Navier-stokes, fluid dynamics, and image and video inpainting
TL;DR: A class of automated methods for digital inpainting using ideas from classical fluid dynamics to propagate isophote lines continuously from the exterior into the region to be inpainted is introduced.
Journal ArticleDOI
A robust image authentication method distinguishing JPEG compression from malicious manipulation
Ching-Yung Lin,Shih-Fu Chang +1 more
TL;DR: An effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression, and describes adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling.