scispace - formally typeset
Journal ArticleDOI

Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism

Reads0
Chats0
TLDR
Experimental results show that the proposed scheme provides high restoration quality and, due to the low embedding volume, the visual quality of the watermarked image is satisfactory.
About
This article is published in Signal Processing.The article was published on 2012-04-01. It has received 110 citations till now. The article focuses on the topics: Contourlet & Block (data storage).

read more

Citations
More filters
Journal ArticleDOI

Robust Image Hashing With Ring Partition and Invariant Vector Distance

TL;DR: This work incorporates ring partition and invariant vector distance to image hashing algorithm for enhancing rotation robustness and discriminative capability, and demonstrates that the proposed hashing algorithm is robust at commonly used digital operations to images.
Journal ArticleDOI

Robust Perceptual Image Hashing Based on Ring Partition and NMF

TL;DR: An efficient image hashing with a ring partition and a nonnegative matrix factorization (NMF) is designed, which has both the rotation robustness and good discriminative capability.
Journal ArticleDOI

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy

TL;DR: A new fragile watermarking scheme with high-quality recovery capability based on overlapping embedding strategy that can achieve better quality of recovered image compared with some of state-of-the-art schemes.
Journal ArticleDOI

Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

TL;DR: The experimental results demonstrate that the proposed DCT based effective self-recoverable fragile watermarking scheme not only outperforms high-quality restoration effectively, but also removes the blocking artifacts and improves the accuracy of tamper localization due to the use of very small size blocks, smoothing function and two levels tampering detection mechanisms.
Journal ArticleDOI

Robust Image Hashing with Tensor Decomposition

TL;DR: A stable three-order tensor is first constructed from the normalized image, so as to enhance the robustness of the TD hashing, where image hash generation is viewed as deriving a compact representation from a tensor.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

The Nonsubsampled Contourlet Transform: Theory, Design, and Applications

TL;DR: This paper proposes a design framework based on the mapping approach, that allows for a fast implementation based on a lifting or ladder structure, and only uses one-dimensional filtering in some cases.
Proceedings ArticleDOI

Navier-stokes, fluid dynamics, and image and video inpainting

TL;DR: A class of automated methods for digital inpainting using ideas from classical fluid dynamics to propagate isophote lines continuously from the exterior into the region to be inpainted is introduced.
Journal ArticleDOI

A robust image authentication method distinguishing JPEG compression from malicious manipulation

TL;DR: An effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression, and describes adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling.
Related Papers (5)