This paper proposes a new block mapping technique for image authentication and self-recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper coincidence problem can arise when modifications to an image affect the original block and its recovery data, resulting in the inability to recover the tampered region of the image. The new block mapping technique ensures that the recovery data of a block is embedded into the most distant location possible, minimizing the tamper coincidence problem. In addition, the improved LSB shifting algorithm is employed to embed the watermark data consisting of authentication and recovery data. The experimental result shows that the AuSR3 can produce high-quality watermarked images a...
In this paper, we present an efficient and effective digital watermarking method for image tamper de...
In this paper, we propose a novel Comprehensive-Monitoring-Motivated Multi-model Watermarking (C3MW)...
The importance of digital image authentication has grown in the last decade particularly with the wi...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...
With the rapid development of multimedia technology, editing and manipulating digital images have be...
This paper presents an image watermarking technique for authentication and self-recovery called AuSR...
Digital medical image has a potential to be manipulated by unauthorized persons due to advanced comm...
Numerous image authentication techniques have been devised to address the potential security issue o...
Numerous image authentication techniques have been devised to address the potential security issue o...
Numerous image authentication techniques have been devised to address the potential security issue o...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Numerous image authentication techniques have been devised to address the potential security issue o...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability o...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
In this paper, we present an efficient and effective digital watermarking method for image tamper de...
In this paper, we propose a novel Comprehensive-Monitoring-Motivated Multi-model Watermarking (C3MW)...
The importance of digital image authentication has grown in the last decade particularly with the wi...
This paper proposes a new block mapping technique for image authentication and self-recovery designe...
With the rapid development of multimedia technology, editing and manipulating digital images have be...
This paper presents an image watermarking technique for authentication and self-recovery called AuSR...
Digital medical image has a potential to be manipulated by unauthorized persons due to advanced comm...
Numerous image authentication techniques have been devised to address the potential security issue o...
Numerous image authentication techniques have been devised to address the potential security issue o...
Numerous image authentication techniques have been devised to address the potential security issue o...
[[abstract]]This study presents an authentication method with self-recovery ability. The hidden wate...
Numerous image authentication techniques have been devised to address the potential security issue o...
The integrity of image content is essential, although most watermarking algorithms can achieve image...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability o...
Abstract The rapid developments of storage technology and information exchange encourage the develop...
In this paper, we present an efficient and effective digital watermarking method for image tamper de...
In this paper, we propose a novel Comprehensive-Monitoring-Motivated Multi-model Watermarking (C3MW)...
The importance of digital image authentication has grown in the last decade particularly with the wi...