[[abstract]]Computer network and digitized information, which bring the convenience of spreading and modifying, make it much easier to acquire multimedia data. Therefore, it becomes more and more important to affirm the legal use of multimedia data to protect the security and credibility of shared data. Digital Watermarking, developing recently, has been proposed as an efficient way to authenticate the integrity of protected image. In the first part of this dissertation, we presented a multipurpose fragile watermarking technique that adopts JPEG-like compressed watermark prototypes. The prototypes among blocks are spread by toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one...
With the popularity and affordability of advanced digital image editing software, users can manipula...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...
[[abstract]]Fragile watermarking techniques are developed to ensure the credibility and integrity of...
[[abstract]]We propose an adaptive watermarking technique that is robust to JPEG compression and sen...
[[abstract]]In this paper, an image authentication technique by embedding digital `watermarks' into ...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimed...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
[[abstract]]In this paper, we present a novel fragile watermarking technique that can localize tampe...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract — In many applications, images are sensitive to an extent such that any modification in it ...
With the popularity and affordability of advanced digital image editing software, users can manipula...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...
[[abstract]]Fragile watermarking techniques are developed to ensure the credibility and integrity of...
[[abstract]]We propose an adaptive watermarking technique that is robust to JPEG compression and sen...
[[abstract]]In this paper, an image authentication technique by embedding digital `watermarks' into ...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimed...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
[[abstract]]In this paper, we present a novel fragile watermarking technique that can localize tampe...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract — In many applications, images are sensitive to an extent such that any modification in it ...
With the popularity and affordability of advanced digital image editing software, users can manipula...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...