In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce watermark payloads, while they have high quality of recovery and security. In watermark embedding phase, we process the image in order to produce the information array for each block, which finally embedded in the host image to build watermarked image. The information array for each block has different length, which is defined based on block characteristic that could be smooth or rough. The second superiority of the proposed method is proposing a new metric for calculating roughness of image block, which leads to less consume of bandwidth i...
In the modern age, watermarking techniques are mandatory to secure digital communication over the in...
Abstract—In various applications, images are sensitive and prone to attacks such that any modificati...
This paper presents an optimized, robust, and secured watermarking technique. The methodology used i...
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while water...
The algorithm of formation, embedding and extracting of digital watermarks using discrete chaotic ma...
International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built ...
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract: In order to improve the security, robustness and invisibility of the digital watermarking,...
AbstractDigital images are widely used and can be easily altered through the internet medium. Theref...
The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
A novel reversible digital watermarking technique for medical images to achieve high level of secrec...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
In the modern age, watermarking techniques are mandatory to secure digital communication over the in...
Abstract—In various applications, images are sensitive and prone to attacks such that any modificati...
This paper presents an optimized, robust, and secured watermarking technique. The methodology used i...
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while water...
The algorithm of formation, embedding and extracting of digital watermarks using discrete chaotic ma...
International audiencetIn this paper a new fragile watermarking algorithm is proposed that is built ...
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main ...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract: In order to improve the security, robustness and invisibility of the digital watermarking,...
AbstractDigital images are widely used and can be easily altered through the internet medium. Theref...
The protection of copyrights of digital media uploaded to the Internet is a growing problem. In this...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
Active attacks and natural impacts can lead to two types of image-container distortions: noise-like ...
A novel reversible digital watermarking technique for medical images to achieve high level of secrec...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
In the modern age, watermarking techniques are mandatory to secure digital communication over the in...
Abstract—In various applications, images are sensitive and prone to attacks such that any modificati...
This paper presents an optimized, robust, and secured watermarking technique. The methodology used i...