International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built upon the cryptanalysis ofthe CWSA algorithm (Chaotic Watermarking Scheme for Authentication of JPEG Images – Wang et al.[14]). The proposed algorithm preserves the advantages of CWSA, but is robust against cryptanalysis,faster and less perceptible. It uses two chaotic maps: the piecewise linear chaotic map and a chaoticgenerator composed of two perturbed recursive filters with a nonlinear function, the Skew Tent map.Experimental results show that the proposed algorithm provides good performances in terms of security,imperceptibility, speed and resistance to cryptographic attacks
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main ...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built ...
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while water...
This paper presents an optimized, robust, and secured watermarking technique. The methodology used i...
Abstract—In various applications, images are sensitive and prone to attacks such that any modificati...
A novel reversible digital watermarking technique for medical images to achieve high level of secrec...
Abstract: In order to improve the security, robustness and invisibility of the digital watermarking,...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main ...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...
International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built ...
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
International audienceThis paper presents two attacks on Teng et al.'s fragile watermarking algorith...
Techniques to establish the authenticity and integrity of digital images are becoming increasly esse...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while water...
This paper presents an optimized, robust, and secured watermarking technique. The methodology used i...
Abstract—In various applications, images are sensitive and prone to attacks such that any modificati...
A novel reversible digital watermarking technique for medical images to achieve high level of secrec...
Abstract: In order to improve the security, robustness and invisibility of the digital watermarking,...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main ...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
In 2003, Lu et al. developed a novel fragile watermarking scheme for image authentication to against...