Image self-recovery aims at protecting digital images from partial damage due to accidental or malicious tampering. It is done by generating a reference code that contains the information of the image and embedding the code in the image itself. This code can later be extracted to restore the tampered regions of the image. The reference code must contain sufficient information to ensure a satisfactory reconstruction while being short enough to remain invisible when embedded in the image, which requires efficient extraction and adaptive encoding of the image information. To this end, we introduce a method for extracting local features in the DCT domain, in which the locations of the three DCT peaks, i.e., the DCT coefficients with the highest...
Abstract—This paper deals with the design of a practical self-recovery mechanism for lossy compresse...
Recovering unknown, missing, damaged, distorted or lost information in DCT coefficients is a common ...
[[abstract]]In this paper, we propose a novel self-recovery scheme for tampered images using vector ...
Feature extraction is a critical element in the design of image self-recovery and watermarking algor...
The advancement of cryptography and cryptanalysis has driven numerous innovations over years. Among ...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
This paper presents a new algorithm to reduce significantly the computational cost of one of the best...
Image Self-Embedding is a method of embedding two sets of data into the original image, authenticati...
JPEG is the most commonly utilized image coding standard for storage and transmission purposes. It a...
JPEG is the most commonly utilized image coding standard for storage and transmission purposes. It a...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
[[abstract]]Reversible watermarking recovers an original image from a watermarked image by extractin...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
[[abstract]]Image authentication schemes verify the integrity of an image against malicious manipula...
Abstract—This paper deals with the design of a practical self-recovery mechanism for lossy compresse...
Recovering unknown, missing, damaged, distorted or lost information in DCT coefficients is a common ...
[[abstract]]In this paper, we propose a novel self-recovery scheme for tampered images using vector ...
Feature extraction is a critical element in the design of image self-recovery and watermarking algor...
The advancement of cryptography and cryptanalysis has driven numerous innovations over years. Among ...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
This paper presents a new algorithm to reduce significantly the computational cost of one of the best...
Image Self-Embedding is a method of embedding two sets of data into the original image, authenticati...
JPEG is the most commonly utilized image coding standard for storage and transmission purposes. It a...
JPEG is the most commonly utilized image coding standard for storage and transmission purposes. It a...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
[[abstract]]Reversible watermarking recovers an original image from a watermarked image by extractin...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
[[abstract]]Image authentication schemes verify the integrity of an image against malicious manipula...
Abstract—This paper deals with the design of a practical self-recovery mechanism for lossy compresse...
Recovering unknown, missing, damaged, distorted or lost information in DCT coefficients is a common ...
[[abstract]]In this paper, we propose a novel self-recovery scheme for tampered images using vector ...