Digital image and video watermarking: methodologies, attacks, applications, and future directions

P Aberna, L Agilandeeswari - Multimedia Tools and Applications, 2024 - Springer
In recent years, internet technology has grown in advance, and multimedia data-sharing
growth rates have skyrocketed. As a result, protecting multimedia data in digital networks …

A fragile image watermarking scheme in dwt domain using chaotic sequences and error-correcting codes

AM Ramos, JAP Artiles, DPB Chaves, C Pimentel - Entropy, 2023 - mdpi.com
With the rapid development of digital signal processing tools, image contents can be easily
manipulated or maliciously tampered with. Fragile watermarking has been largely used for …

Detection and recovery of higher tampered images using novel feature and compression strategy

F Tohidi, M Paul, MR Hooshmandasl - IEEE Access, 2021 - ieeexplore.ieee.org
Due to the availability of powerful image-editing software and the growing amount of
multimedia data that is transmitted via the Internet, integrity verifications and confidentiality of …

Multipurpose image watermarking: ownership check, tamper detection and self-recovery

R Sinhal, IA Ansari - Circuits, Systems, and Signal Processing, 2022 - Springer
In the present digital scenario, false ownership claims and tampering with digital data have
become serious concerns for users. There have been a very few schemes proposed in the …

Watermarking approach for source authentication of web content in online social media: a systematic literature review

M Shaliyar, K Mustafa - Multimedia Tools and Applications, 2023 - Springer
Abstract Online Social Media (OSM) enables users to create a powerful virtual bond that
facilitates global forwarding/sharing of messages, decision-making, analysis, or voting …

[HTML][HTML] AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem

A Aminuddin, F Ernawan - Journal of King Saud University-Computer and …, 2023 - Elsevier
This paper proposes a new block mapping technique for image authentication and self-
recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper …

Detection and localization of image tampering in digital images with fused features

M Ahmad, F Khursheed - Concurrency and Computation …, 2022 - Wiley Online Library
In digital forensics, image tamper detection and localization have attracted increased
attention in recent days, where the standard methods have limited description ability and …

Nested block based double self-embedding fragile image watermarking with super-resolution recovery

N Rijati - IEEE Access, 2023 - ieeexplore.ieee.org
Self-recovery capability is challenging in developing fragile watermarking alongside
authentication and tamper localization. In certain situations, authentication and tamper …

[HTML][HTML] A chaotic-based watermarking scheme for ensuring integrity of a face recognition system in public large gathering scenario

BS Alhazmi, O Benrhouma, AN AlHassan… - Journal of King Saud …, 2023 - Elsevier
Secure data transmission is critical in public video surveillance applications such as tracking
missing persons in large crowd gatherings. It may help the security personnel to monitor & …

Co-design secure control based on image attack detection and data compensation for networked visual control systems

D Du, L Wu, C Zhang, Z Fei, L Yang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The incomplete and untrue data caused by cyberattacks (eg, image information leakage and
tampering) will affect the control performance and even lead to system instability. To address …