Localization and security enhancement of block-based image authentication

AH Ouda, MR El-Sakka - IEEE International Conference on …, 2005 - ieeexplore.ieee.org
Most block-based image authentication techniques that are presented in the literature
sacrifice localization accuracy in order to resist vector quantization (VQ) counterfeiting …

Secure private fragile watermarking scheme with improved tampering localisation accuracy

S Bravo-Solorio, L Gan, AK Nandi, MF Aburdene - IET information security, 2010 - IET
In some applications, such as surveillance cameras, it is essential that images acquired with
the same device be deemed distinct. To fulfil this requirement, many fragile watermarking …

[PDF][PDF] Survey on data hiding in encrypted images

A Kesharwani, H Gupta - International Research Journal of …, 2015 - academia.edu
As the use digital techniques for transmitting and storing images are increasing; it is
becoming an important issue how to protect the confidentiality, integrity and authenticity of …

Hierarchical ownership and deterministic watermarking of digital images via polynomial interpolation

G Boato, FGB De Natale, C Fontanari… - Signal Processing: Image …, 2006 - Elsevier
This paper presents a novel method for the secure management of digital images formulated
within the mathematical theory of polynomial interpolation. As main innovative features, our …

[PDF][PDF] Review of Reversible Data Hiding Techniques

H Gawali, RC Samant - International Research Journal of …, 2015 - academia.edu
Reversible data hiding is a technique by using which we can embed essential data into
images, audio, video and so on. This system applies a method of hiding data in an image …

An application on combining of cryptography and steganography for improving security

SBH Hasan - 2019 - acikbilim.yok.gov.tr
To hide hidden data in digital images, a variety of techniques are available, some of which
are more complex than others. Public key cryptography is very useful for applications, and …

[PDF][PDF] Analysis of Data Hiding Techniques in Encrypted Images-A Survey

KA Kumar, SM Riyazoddin - Global Journal of Computer Science …, 2013 - academia.edu
CMR Institute of Technology, Hyderabad Abstract-As the use digital techniques for
transmitting and storing images are increasing; it is becoming an important issue how to …

Data hiding for authentication of binary images

H Yang - 2008 - dr.ntu.edu.sg
In this thesis, we propose different data hiding techniques for authentication of binary
images. Issues in capacity, visual quality, system security, computational complexity and …

Part Review on Multimedia Security

AC Kot, H Yang, H Cao - Multimedia Image and Video …, 2017 - api.taylorfrancis.com
The history of secret communication can be traced back to ancient greece [1, 2]. Several
technologies commonly used to describe the secret communication by hiding information …

[PDF][PDF] Integrity verification of digital images through fragile watermarking and image forensics.

S Bravo-Solorio - 2010 - core.ac.uk
Detecting manipulations in digital images by bare-eye examinations has become
increasingly difficult, due to the availability of open-source and commercial image editing …