CT Li, H Si - Journal of Electronic Imaging, 2007 - spiedigitallibrary.org
We propose a fragile watermarking scheme in the wavelet transform domain that is sensitive to all kinds of manipulations and has the ability to localize the tampered regions. To achieve …
O Ali, A Ouda - 2016 IEEE 7th Annual Information Technology …, 2016 - ieeexplore.ieee.org
Healthcare organizations are undergoing tremendous change in analytical computing. The vehicle for this change is implementing a Business Intelligence (BI) platform, which includes …
Digital media manipulation has become easily performed at personal level with the rapidly growth of Technology. Presenting an issue of protecting digital media integrity …
CT Li, Y Yuan - Optical Engineering, 2006 - spiedigitallibrary.org
Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements …
H Liu, M Steinebach - 2006 International Conference on Image …, 2006 - ieeexplore.ieee.org
In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process …
H Liu, M Steinebach - … on Automated Production of Cross Media …, 2006 - ieeexplore.ieee.org
In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process …
Y Wu - 2006 International Conference on Image Processing, 2006 - ieeexplore.ieee.org
This paper presents an authentication watermarking method which can localize the tampering regions in fine granularity. Unlike the previous block-wise tampering-localization …