Digital image integrity–a survey of protection and verification techniques

P Korus - Digital Signal Processing, 2017 - Elsevier
We are currently on a verge of a revolution in digital photography. Developments in
computational imaging and adoption of artificial intelligence have spawned new editing …

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy

C Qin, P Ji, X Zhang, J Dong, J Wang - Signal processing, 2017 - Elsevier
In this paper, we propose a new fragile watermarking scheme with high-quality recovery
capability based on overlapping embedding strategy. The block-wise mechanism for …

An effective fragile watermarking scheme for color image tampering detection and self-recovery

J Molina-Garcia, BP Garcia-Salgado… - Signal Processing …, 2020 - Elsevier
In this paper, a fragile watermarking scheme for color-image authentication and self-
recovery is proposed. Original image is divided into non-overlapping blocks, and for each i …

Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

D Singh, SK Singh - Journal of Visual Communication and Image …, 2016 - Elsevier
This paper presents a Discrete Cosine Transformation (DCT) based effective self-
recoverable fragile watermarking scheme. For each 2× 2 non-overlapping block, two …

DCT based efficient fragile watermarking scheme for image authentication and restoration

D Singh, SK Singh - Multimedia Tools and Applications, 2017 - Springer
Due to rapid development of Internet and computer technology, image authentication and
restoration are very essential, especially when it is utilized in forensic science, medical …

Multi-scale fusion for improved localization of malicious tampering in digital images

P Korus, J Huang - IEEE Transactions on Image Processing, 2016 - ieeexplore.ieee.org
A sliding window-based analysis is a prevailing mechanism for tampering localization in
passive image authentication. It uses existing forensic detectors, originally designed for a full …

A survey on reversible watermarking for multimedia content: A robustness overview

A Menendez-Ortiz, C Feregrino-Uribe… - IEEE …, 2019 - ieeexplore.ieee.org
In recent years, the growth of the Internet along with multimedia data delivery, have caused
the misuse and even alteration of the original digital content. As a security mechanism …

Fragile watermarking schemes for image authentication: a survey

K Sreenivas, V Kamkshi Prasad - International Journal of Machine …, 2018 - Springer
This paper presents a survey of fragile watermarking schemes for image authentication
proposed in the past decade. The limited embedding capacity and extent of tampering are …

Image self-recovery with watermark self-embedding

WL Tai, ZJ Liao - Signal Processing: Image Communication, 2018 - Elsevier
In this paper, an effective image authentication method for image tamper detection and self-
recovery is proposed. We embed the fragile watermark of one block which consists of …

A novel color image tampering detection and self-recovery based on fragile watermarking

X Xia, S Zhang, K Wang, T Gao - Journal of Information Security and …, 2023 - Elsevier
In industrial applications, sensing devices' image data must be accurately identified and
recovered to prevent economic losses. Nevertheless, most industrial image watermarking …