A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

A recent survey on image watermarking techniques and its application in e-governance

C Kumar, AK Singh, P Kumar - Multimedia Tools and Applications, 2018 - Springer
This survey presents a brief discussion of different aspects of digital image watermarking.
Included in the present discussion are these general concepts: major characteristics of …

A comprehensive survey on methods for image integrity

P Capasso, G Cattaneo, M De Marsico - ACM Transactions on …, 2024 - dl.acm.org
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …

A semi-blind digital watermarking scheme based on singular value decomposition

JM Shieh, DC Lou, MC Chang - Computer Standards & Interfaces, 2006 - Elsevier
This paper presents a robust watermarking approach for hiding grayscale watermarks into
digital images. Plugging the codebook concept into the singular value decomposition (SVD) …

A novel pseudo random sequence generator for image-cryptographic applications

R Hamza - Journal of Information Security and Applications, 2017 - Elsevier
In this paper, we propose a novel algorithm for pseudo random number sequence generator
based on the samples of Chen chaotic system. The proposed algorithm can be used to …

A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map

R Hamza, F Titouna - Information Security Journal: A Global …, 2016 - Taylor & Francis
In this article, a novel sensitive encryption scheme to secure the digital images based on the
Zaslavsky chaotic map is proposed. We employ the Zaslavsky chaotic map as a pseudo …

A copyright protection scheme for digital images using visual cryptography technique

DC Lou, HK Tso, JL Liu - Computer Standards & Interfaces, 2007 - Elsevier
A robust copyright protection scheme for digital image is proposed in the paper. In the
proposed scheme, the watermark does not require to be embedded into the protected image …

A publicly verifiable copyright-proving scheme resistant to malicious attacks

TH Chen, G Horng, WB Lee - IEEE Transactions on industrial …, 2005 - ieeexplore.ieee.org
A wavelet-based copyright-proving scheme that does not require the original image for logo
verification is proposed in this paper. The scheme is strong enough to resist malicious …

A high quality image sharing with steganography and adaptive authentication scheme

CC Wu, SJ Kao, MS Hwang - Journal of Systems and Software, 2011 - Elsevier
With the rapid growth of numerous multimedia applications and communications through
Internet, secret image sharing has been becoming a key technology for digital images in …

FPGA implementation of digital images watermarking system based on discrete Haar wavelet transform

MA Hajjaji, M Gafsi, A Ben Abdelali… - Security and …, 2019 - Wiley Online Library
In this paper we propose a novel and efficient hardware implementation of an image
watermarking system based on the Haar Discrete Wavelet Transform (DWT). DWT is used in …