Image forgery techniques: a review

G Kaur, N Singh, M Kumar - Artificial Intelligence Review, 2023 - Springer
Image forensics is an investigation of digital images to identify manipulations that have been
done on them. Nowadays, due to the availability of different low-cost devices for capturing …

Region-based hybrid medical image watermarking scheme for robust and secured transmission in IoMT

P Singh, KJ Devi, HK Thakkar, K Kotecha - IEEE Access, 2022 - ieeexplore.ieee.org
With the growth in Internet and digital technology, Internet of Medical Things (IoMT) and
Telemedicine have become buzzwords in healthcare. A large number of medical images …

A survey on fragile watermarking based image authentication schemes

NRN Raj, R Shreelekshmi - Multimedia Tools and Applications, 2021 - Springer
Ensuring the image content authentication is a necessity need when images are used as
supporting evidence in critical applications such as law enforcement, medical diagnosis …

A self-embedding secure fragile watermarking scheme with high quality recovery

L Huang, D Kuang, C Li, Y Zhuang, S Duan… - Journal of Visual …, 2022 - Elsevier
In recent years, with the development of cloud storage, more and more people upload
images to the cloud for storage. However, confidentiality and integrity issues may arise …

A fragile image watermarking scheme in dwt domain using chaotic sequences and error-correcting codes

AM Ramos, JAP Artiles, DPB Chaves, C Pimentel - Entropy, 2023 - mdpi.com
With the rapid development of digital signal processing tools, image contents can be easily
manipulated or maliciously tampered with. Fragile watermarking has been largely used for …

Tamper detection and self-recovery of medical imagery for smart health

M Hussan, SA Parah, S Gull, GJ Qureshi - Arabian Journal for Science and …, 2021 - Springer
Abstract Social Internet of Things (SIoT) is one of the emerging research areas which
integrates the Internet of Things (IoT) with social networking concepts. It envisages better …

Hash-based image watermarking technique for tamper detection and localization

M Hussan, SA Parah, A Jan, GJ Qureshi - Health and Technology, 2022 - Springer
The accumulating and proliferating of the internet has increased ten folds from the year 2010
to 2020 according to the Ericsson report. This trend is further increasing, making the …

Multipurpose image watermarking: ownership check, tamper detection and self-recovery

R Sinhal, IA Ansari - Circuits, Systems, and Signal Processing, 2022 - Springer
In the present digital scenario, false ownership claims and tampering with digital data have
become serious concerns for users. There have been a very few schemes proposed in the …

Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method

A Renklier, S Öztürk - Multimedia Tools and Applications, 2024 - Springer
In recent years, image forgery has become an important issue with the use of images in
many important areas. Several self-embedding fragile watermarking methods have been …

A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nesting

F Peng, ZX Lin, X Zhang, M Long - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
To achieve high tampering localization precision and low distortion, a semi-fragile reversible
watermarking for authenticating 2D engineering graphics is proposed based on an …