Digital image watermarking: its formal model, fundamental properties and possible attacks

H Nyeem, W Boles, C Boyd - EURASIP Journal on Advances in Signal …, 2014 - Springer
While formal definitions and security proofs are well established in some fields like
cryptography and steganography, they are not as evident in digital watermarking research. A …

Two‐Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

MS Khalil, F Kurniawan, MK Khan… - The Scientific World …, 2014 - Wiley Online Library
This paper presents a novel watermarking method to facilitate the authentication and
detection of the image forgery on the Quran images. Two layers of embedding scheme on …

A DCT domain smart vicinity reliant fragile watermarking technique for DIBR 3D-TV

T Bashir, I Usman, AA Albesher, SH Atawneh… - …, 2020 - Taylor & Francis
This work presents a vicinity reliant intelligent fragile watermarking scheme for depth image-
based rendering technique used for three-dimensional television. Depth map of a centre …

[PDF][PDF] 디지털서명과메시지인증코드를이용한영상의무결성검증에관한연구

우찬일 - 한국산학기술학회논문지, 2022 - kais99.org
요 약 디지털 멀티미디어 콘텐츠는 쉽게 조작 되거나 복사 될 수 있기 때문에 디지털 멀티미디어
콘텐츠에 대한 출처와변형 여부를 확인하는 것이 매우 중요하다. 이를 위해 디지털 멀티미디어 …

Modelling attacks on self-authentication watermarking

H Nyeem, W Boles, C Boyd - Multimedia Tools and Applications, 2016 - Springer
Abstract Although the Self-Authentication Watermarking (SAW) schemes are promising to
tackle the multimedia information assurance problem, their unknown security level seems to …

Developing a pixel value ordering based reversible data hiding scheme

SA Hasib, H Nyeem - 2017 3rd International Conference on …, 2017 - ieeexplore.ieee.org
Pixel Value Ordering (PVO)-based Reversible Data Hiding (RDH) schemes are promising
for the applications requiring high fidelity embedded images. This paper presents modeling …

Notice of Removal: Robust image watermarking using tetrolet transform

SKM Vali, KLN Kishore… - … Conference on Electrical …, 2015 - ieeexplore.ieee.org
Notice of Removal: Robust image watermarking using tetrolet transform | IEEE Conference
Publication | IEEE Xplore Notice of Removal: Robust image watermarking using tetrolet …

Rate-distortion analysis of an improved pixel value ordering based reversible embedding

SA Hasib, H Nyeem - 2017 2nd International Conference on …, 2017 - ieeexplore.ieee.org
This paper presents an improvement of a prominent Pixel Value Ordering (PVO)-based
Reversible Data Hiding (RDH) scheme. We started with analyzing the rate-distortion …

Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique

S Hosseini, M Mahdavi - 2016 13th International Iranian Society …, 2016 - ieeexplore.ieee.org
Semi-fragile watermarking methods are mainly characterized by their robustness against
unintentional attacks such as regular image processing and their fragility against intentional …

해쉬체인을이용한무결성검증에관한연구

우찬일 - 전자공학회논문지, 2021 - dbpia.co.kr
디지털 미디어는 저장과 배포가 용이하지만 불법적인 목적으로 수정하는 것이 쉽기 때문에
디지털 미디어에 대한 정보보호의 중요성은 점점 더 증가하고 있다. 디지털 영상의 경우 영상 …