An effective SVD-based image tampering detection and self-recovery using active watermarking

S Dadkhah, A Abd Manaf, Y Hori, AE Hassanien… - Signal Processing …, 2014 - Elsevier
In this paper, an effective tamper detection and self-recovery algorithm based on singular
value decomposition (SVD) is proposed. This method generates two distinct tamper …

An efficient image self-recovery and tamper detection using fragile watermarking

S Dadkhah, AA Manaf, S Sadeghi - International Conference Image …, 2014 - Springer
Fragile watermarking is one of the most effective approaches to insure the integrity of digital
images. In this paper, an efficient self-recovery and tamper localization scheme using fragile …

Image authentication and restoration by multiple watermarking techniques with advance encryption standard in digital photography

S Riaz, SW Lee - 2013 15th International Conference on …, 2013 - ieeexplore.ieee.org
In the past few years, semi-fragile watermarking techniques have become increasingly
important to secure and verify the multimedia content and also to localize the tampered …

Efficient image authentication and tamper localization algorithm using active watermarking

S Dadkhah, AA Manaf, S Sadeghi - Bio-inspiring Cyber Security and …, 2014 - Springer
Due to the increasing number of forged images and possibilities of effortless digital
manipulations, certain organizations have started to focus on approaches that help preserve …

Method for detection of image tampering and partial recovery

D Asatryan, N Asatryan, N Lanina… - … on Computer Science …, 2013 - ieeexplore.ieee.org
In this paper, the problems of detection of unauthorized changes to the content of a digital
image, determination of distorted parts and partial recovering of the content from the …

A study on integrity verification and tamper detection of digital image

CI Woo, EH Goo - Journal of the Korea Academia-Industrial …, 2019 - koreascience.kr
Digital watermarking was developed to protect copyright by discouraging the illegal copying
of digital content. On the other hand, recently, watermarking has also been used to verify the …

Digital Watermarking Based on a Gradient Orientation Code

T Kondo, Y Kamakura - 2022 61st Annual Conference of the …, 2022 - ieeexplore.ieee.org
This paper proposes a novel digital watermark based on the gradient orientations of a digital
image. The specific features of a digital image can be expressed pixelwise using a 3-bit …

[PDF][PDF] Authenticating Images using Blind Fragile Watermarking Scheme based on LSB Technique

M Baghel, R Bhardwaj, S Shivani - International Journal of Computer …, 2013 - academia.edu
This paper proposes blind fragile watermarking scheme along with the pixel-wise technique.
Proposed scheme is capable enough in detecting tampered pixels and also able to provide …

A Study on Image Integrity Verification Based on RSA and Hash Function

CI Woo, EH Goo - Journal of the Korea Academia-Industrial …, 2020 - koreascience.kr
Cryptographic algorithms are used to prevent the illegal manipulation of data. They are
divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key …

An adaptive quin tree decomposition (AQTD) technique in image authentication through Lossless Watermarking (LWM)

A Chitla, MC Mohan - Pattern Recognition and Image Analysis, 2016 - Springer
Watermarking is a means of implanting data in the form of text, symbols or any credential
into the multimedia data such as image, audio or video. The conventional produces below …