In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against the quantization attack. Unfortunately, their scheme is not secure enough. In 2006, Liao et al. proposed two types of attack on Lu et al.’s scheme. They pointed out that Lu et al.’s scheme is still impractical. To achieve both the copyright protection and tamper detection of stego-image, a robust-fragile watermarking algorithm is proposed in this paper. Our proposed scheme is not only to against the quantization attack (“Modification attack ” and “Counterfeit attack”), but also to achieve both the copyright protection and tamper detection of stego-image. From experimental result, we can show that the performance of our proposed scheme is bet...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
With the popularity of network and the continuous development of multimedia technology, saving of ne...
Even after rapid development of encryption and decryption algorithms, the communication channels sti...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
Techniques to establish the authenticity and integrity of digital images are becom-ing increasingly ...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
With the popularity of network and the continuous development of multimedia technology, saving of ne...
Even after rapid development of encryption and decryption algorithms, the communication channels sti...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
Techniques to establish the authenticity and integrity of digital images are becom-ing increasingly ...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Watermarking schemes for authentication purposes are characterized by three factors: security, resol...