Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high security, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondetermi...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color ima...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...
We propose a fragile watermarking scheme in the wavelet transform domain that is sensitive to all ki...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
[[abstract]]The article presents a novel fragile watermarking scheme based on the concept of pixel d...
The security of a watermarking scheme is mainly categorised as either robust or fragile. The former ...
[[abstract]]Image authentication is an important research topic of maintaining the integrity of digi...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color ima...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...
We propose a fragile watermarking scheme in the wavelet transform domain that is sensitive to all ki...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
In this paper, we present three counterfeiting attacks on the block-wise dependent fragile watermark...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
[[abstract]]Recently, Lu et al. proposed a fragile watermarking scheme to prevent the quantization a...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
[[abstract]]The article presents a novel fragile watermarking scheme based on the concept of pixel d...
The security of a watermarking scheme is mainly categorised as either robust or fragile. The former ...
[[abstract]]Image authentication is an important research topic of maintaining the integrity of digi...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color ima...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...