This paper presents an image watermarking technique for authentication and self-recovery called AuSR2. The AuSR2 scheme partitions the cover image into 3 × 3 non-overlapping blocks. The watermark data is embedded into two Least Significant Bit (LSB), consisting of two authentication bits and 16 recovery bits for each block. The texture of each block is preserved in the recovery data. Thus, each tampered pixel can be recovered independently instead of using the average block. The recovery process may introduce the tamper coincidence problem, which can be solved using image inpainting. The AuSR2 implements the LSB shifting algorithm to increase the imperceptibility by 2.8%. The experimental results confirm that the AuSR2 can accurately detect...
This paper presents a new algorithm to reduce significantly the computational cost of one of the best...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
Numerous image authentication techniques have been devised to address the potential security issue o...
With the rapid development of multimedia technology, editing and manipulating digital images have be...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
Numerous image authentication techniques have been devised to address the potential security issue o...
With the popularity and affordability of advanced digital image editing software, users can manipula...
The growth of internet technology makes digital images can be easily distributed and modified to cha...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
Digital medical image has a potential to be manipulated by unauthorized persons due to advanced comm...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper presents a new algorithm to reduce significantly the computational cost of one of the best...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
Numerous image authentication techniques have been devised to address the potential security issue o...
With the rapid development of multimedia technology, editing and manipulating digital images have be...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
Numerous image authentication techniques have been devised to address the potential security issue o...
With the popularity and affordability of advanced digital image editing software, users can manipula...
The growth of internet technology makes digital images can be easily distributed and modified to cha...
[[abstract]]In recent decades, many watermarking schemes for tamper detection and tampered image rec...
Digital medical image has a potential to be manipulated by unauthorized persons due to advanced comm...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed which a...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper presents a new algorithm to reduce significantly the computational cost of one of the best...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
Numerous image authentication techniques have been devised to address the potential security issue o...