Currently, the watermark capacity of most self-recovery fragile image watermarking schemes is fixed. That means for smooth regions and texture regions, the length of watermark information is always the same. However, it is impractical since more recovery information is needed for the recovery of texture regions. In this paper, a self-recovery fragile image watermarking with variable watermark capacity is proposed. Based on the characteristic of singular value decomposition (SVD), a new block classification method is introduced. The image blocks are classified into smooth blocks and texture blocks. For smooth blocks, the average pixel values are adopted as the recovery information to recover the tampered blocks, while for texture blocks, the...
In this paper, a novel block-wise fragile image watermarking algorithm for tampering localization an...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Numerous image authentication techniques have been devised to address the potential security issue o...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
Due to the advances in computer-based communication and health services over the past decade, the ne...
Abstract—This paper proposes a hierarchical fragile watermarking scheme for image authentication wit...
Digital image authentication has become a hot topic in the last few years. In this paper, a pixel-ba...
Image tamper detection and recovery has become an important issue in recent years. In order to detec...
Nowadays, image authentication techniques are widely applied to digital multimedia to address their ...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
This paper proposes a new fragile watermarking capable of perfectly restoring the original watermark...
In this paper, a novel fragile image watermarking scheme based on singular value decomposition (SVD)...
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragil...
This paper presents a new fragile watermarking method, whereby two mechanisms are hierarchically str...
In this paper, a novel block-wise fragile image watermarking algorithm for tampering localization an...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Numerous image authentication techniques have been devised to address the potential security issue o...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
Due to the advances in computer-based communication and health services over the past decade, the ne...
Abstract—This paper proposes a hierarchical fragile watermarking scheme for image authentication wit...
Digital image authentication has become a hot topic in the last few years. In this paper, a pixel-ba...
Image tamper detection and recovery has become an important issue in recent years. In order to detec...
Nowadays, image authentication techniques are widely applied to digital multimedia to address their ...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
This paper proposes a new fragile watermarking capable of perfectly restoring the original watermark...
In this paper, a novel fragile image watermarking scheme based on singular value decomposition (SVD)...
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragil...
This paper presents a new fragile watermarking method, whereby two mechanisms are hierarchically str...
In this paper, a novel block-wise fragile image watermarking algorithm for tampering localization an...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Numerous image authentication techniques have been devised to address the potential security issue o...