A review of image watermarking for identity protection and verification

S Sharma, JJ Zou, G Fang, P Shukla, W Cai - Multimedia Tools and …, 2024 - Springer
Identity protection is an indispensable feature of any information security system. An identity
can exist in the form of digitally written signatures, biometric information, logos, etc. It serves …

A survey on fragile watermarking based image authentication schemes

NRN Raj, R Shreelekshmi - Multimedia Tools and Applications, 2021 - Springer
Ensuring the image content authentication is a necessity need when images are used as
supporting evidence in critical applications such as law enforcement, medical diagnosis …

Data hiding and integrity verification based on quotient value differencing and Merkle tree

DB Khadse, G Swain - Arabian Journal for Science and Engineering, 2023 - Springer
The three important quality aspects of image steganography mechanisms are hiding
capacity (HC), peak signal-to-noise ratio (PSNR), and attack resistance. While the stego …

Image tamper detection and correction using Merkle tree and remainder value differencing

SD Kosuru, G Swain, N Kumar, A Pradhan - Optik, 2022 - Elsevier
This article proposes an image tamper detection and correction technique. It uses the
principle of differencing and addresses the fall off boundary problem (FOBP). It operates on …

[HTML][HTML] AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem

A Aminuddin, F Ernawan - Journal of King Saud University-Computer and …, 2023 - Elsevier
This paper proposes a new block mapping technique for image authentication and self-
recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper …

High payload watermarking based on enhanced image saliency detection

A Khan, KS Wong - Multimedia Tools and Applications, 2023 - Springer
Nowadays, images are circulated rapidly over the internet and they are subject to some risk
of misuses. To address this issue, various watermarking methods are proposed in the …

Fragile watermarking based on QR decomposition and Fourier transform

F Nejati, H Sajedi, A Zohourian - Wireless Personal Communications, 2022 - Springer
In this study, a fragile watermarking technique is introduced for verifying images based on
QR decomposition and Fourier Transform (FT). At first, we apply the FT to the host image to …

A lightweight fragile audio watermarking method using nested hashes for self-authentication and tamper-proof

AA AlSabhany, AH Ali, M Alsaadi - Multimedia Tools and Applications, 2024 - Springer
Watermarking methods have traditionally emerged from the imperative to guarantee the
authenticity of digital documents. As we navigate the current landscape of advancing voice …

Blind image authentication using singular value decomposition with enhanced robustness by augmenting hamming code

BR Ghosh, JK Mandal, S Das, A Laha… - … Journal of Computers …, 2024 - Taylor & Francis
Singular value decomposition (SVD) based image authentication has widespread
applications for digital media protection including forensic and medical domains due to the …

Image Tamper Detection and Correction Based on Mean Pixel Value and Logistic Map

AR Gottimukkala, A Pradhan… - 2023 9th International …, 2023 - ieeexplore.ieee.org
This proposed image watermarking scheme works on 4× 4 pixel blocks. The least significant
bits (LSBs) of all the 16 pixels are set to zeroes. After setting all the LSBs to zeroes, the …