Multiple watermarking of medical images for content authentication and recovery

NA Memon, SAM Gilani… - 2009 IEEE 13th …, 2009 - ieeexplore.ieee.org
… One can use the semi-fragile watermarking for copyright and authentication of medical
images. In this case while using robust watermarks we are much concerned with the image …

Authentication and recovery of images using multiple watermarks

R Chamlawi, A Khan, I Usman - Computers & Electrical Engineering, 2010 - Elsevier
… coefficients for watermark correlation and embedding. In this work, we develop two watermarks
to be … Firstly a binary watermark is used to accurately authenticate the content as well as …

Dual-purpose semi-fragile watermark: authentication and recovery of digital images

R Ullah, A Khan, AS Malik - Computers & Electrical Engineering, 2013 - Elsevier
… Now a day the researchers have proposed number of watermarking techniques that can
protect the content as well as recover it if the content is distorted. There are two ways to …

Speech authentication and content recovery scheme for security communication and storage

Q Qian, H Wang, X Sun, Y Cui, H Wang… - Telecommunication …, 2018 - Springer
… For the procedure of watermark extraction and content authentication, if the ith speech … ,
the corresponding reconstructed watermark will be different from the extracted watermark, so we …

Dual watermarking framework for privacy protection and content authentication of multimedia

NN Hurrah, SA Parah, NA Loan, JA Sheikh… - Future generation …, 2019 - Elsevier
… , data security and content authentication of multimedia … of by embedding a robust watermark
using an efficient inter-… the original watermark is said to be completely recovered. Some of …

Wavelet-based reversible watermarking for authentication

J Tian - Security and watermarking of multimedia contents IV, 2002 - spiedigitallibrary.org
… the digital image, for the purpose of content authentication and original content recovery. …
1, we embed a reversible watermark in a digital image I, and obtain the watermarked image I…

Color image watermarking for content authentication and self-restoration applications based on a dual-domain approach

HM Al-Otum, M Ibrahim - Multimedia Tools and Applications, 2021 - Springer
… Here, the watermark was embedded, twice, into two different locations in the host to obtain a
… image authentication with self-recovery capability. The watermark data for content recovery

Authentication and recovery algorithm for speech signal based on digital watermarking

Z Liu, F Zhang, J Wang, H Wang, J Huang - Signal Processing, 2016 - Elsevier
… A content authentication and tamper recovery scheme for … , a tamper recovery scheme
based on digital watermark is … method for digital speech signals based on discrete cosine …

Watermarking-based image authentication with recovery capability using halftoning technique

L Rosales-Roldan, M Cedillo-Hernandez… - Signal Processing …, 2013 - Elsevier
… for image content authentication with localization and recovery capability … based on QIM
dither modulation in the IWT domain, in which authentication watermark and recovery watermark

Digital image authentication and recovery: employing integer transform based information embedding and extraction

R Chamlawi, A Khan - Information Sciences, 2010 - Elsevier
authenticating digital contentswatermark called recovery watermark, is computed through
the properly modified version of the compressed original image. The authentication watermark