In this paper, a novel block-wise fragile image watermarking algorithm for tampering localization and recovery is proposed. The image is divided into Region of Interest (ROI) and Region of Non Interest (RONI). Considering the ROIbased self-embedding problem as a special erasure channel, fountain code is applied in our method to deal with the reference symbols loss. And to minimize quality degradation in ROI, the reference symbols for recovery are only embedded into RONI blocks. Theoretical analysis shows that the result is nearly optimal, and the experimental results demonstrate the proposed method can offer low payload and high tamper tolerance. And the quality of both the watermarked image and the reconstructed image is high
Currently, the watermark capacity of most self-recovery fragile image watermarking schemes is fixed....
Abstract—This paper deals with the design of a practical self-recovery mechanism for lossy compresse...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...
In this paper we propose a new method for content reconstruction using self-embedding technology. As...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
Image tamper detection and recovery has become an important issue in recent years. In order to detec...
It is increasingly important to achieve security and anti-counterfeiting for medical images. The int...
This paper presents a new fragile watermarking method, whereby two mechanisms are hierarchically str...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
This paper proposes a new fragile watermarking capable of perfectly restoring the original watermark...
This paper presents a reference sharing mechanism-based self-embedding watermarking scheme. The host...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
Numerous image authentication techniques have been devised to address the potential security issue o...
Abstract—This paper proposes a hierarchical fragile watermarking scheme for image authentication wit...
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, p...
Currently, the watermark capacity of most self-recovery fragile image watermarking schemes is fixed....
Abstract—This paper deals with the design of a practical self-recovery mechanism for lossy compresse...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...
In this paper we propose a new method for content reconstruction using self-embedding technology. As...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
Image tamper detection and recovery has become an important issue in recent years. In order to detec...
It is increasingly important to achieve security and anti-counterfeiting for medical images. The int...
This paper presents a new fragile watermarking method, whereby two mechanisms are hierarchically str...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
This paper proposes a new fragile watermarking capable of perfectly restoring the original watermark...
This paper presents a reference sharing mechanism-based self-embedding watermarking scheme. The host...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
Numerous image authentication techniques have been devised to address the potential security issue o...
Abstract—This paper proposes a hierarchical fragile watermarking scheme for image authentication wit...
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, p...
Currently, the watermark capacity of most self-recovery fragile image watermarking schemes is fixed....
Abstract—This paper deals with the design of a practical self-recovery mechanism for lossy compresse...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...