A survey of watermarking algorithms for image authentication

C Rey, JL Dugelay - EURASIP Journal on Advances in Signal Processing, 2002 - Springer
Digital image manipulation software is now readily available on personal computers. It is
therefore very simple to tamper with any image and make it available to others. Insuring …

[PDF][PDF] A watermarking technique for digital imagery: further studies

RB Wolfgang, EJ Delp - International Conference on Imaging …, 1997 - cerias.purdue.edu
The growth of networked multimedia systems has created a need for the copyright protection
of digital images. Copyright protection involves the authentication of image ownership and …

Digital image watermarking techniques: a review

M Begum, MS Uddin - Information, 2020 - mdpi.com
Digital image authentication is an extremely significant concern for the digital revolution, as it
is easy to tamper with any image. In the last few decades, it has been an urgent concern for …

Methods for image authentication: a survey

A Haouzia, R Noumeir - Multimedia tools and applications, 2008 - Springer
Image authentication techniques have recently gained great attention due to its importance
for a large number of multimedia applications. Digital images are increasingly transmitted …

[PDF][PDF] A watermark for image integrity and ownership verification

PW Wong - PICS, 1998 - imaging.org
We describe in this paper a watermarking scheme for ownership verification and image
authentication. This authentication watermark is invisible, and has applications in trusted …

Fair benchmark for image watermarking systems

M Kutter, FAP Petitcolas - Security and watermarking of …, 1999 - spiedigitallibrary.org
Since the early 90s a number of papers on'robust'digital watermarking systems have been
presented but none of them uses the same robustness criteria. This is not practical at all for …

A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images

W Zeng, B Liu - IEEE Transactions on Image Processing, 1999 - ieeexplore.ieee.org
Digital watermarking has been proposed as the means for copyright protection of multimedia
data. Many of existing watermarking schemes focused on the robust means to mark an …

A hierarchical digital watermarking method for image tamper detection and recovery

PL Lin, CK Hsieh, PW Huang - Pattern recognition, 2005 - Elsevier
In this paper, we present an efficient and effective digital watermarking method for image
tamper detection and recovery. Our method is efficient as it only uses simple operations …

Robust image authentication method surviving JPEG lossy compression

CY Lin, SF Chang - Storage and Retrieval for Image and …, 1997 - spiedigitallibrary.org
Image authentication verifies the originality of an image by detecting malicious
manipulations. This goal is different from that of image watermarking which embeds into the …

Cryptanalysis of the Yeung–Mintzer fragile watermarking technique

J Fridrich, M Goljan, N Memon - Journal of electronic imaging, 2002 - spiedigitallibrary.org
The recent proliferation of digital multimedia content has raised concerns about
authentication mechanisms for multimedia data. A number of authentication techniques …