Tampering with a watermarking-based image authentication scheme
From MaRDI portal
Publication:941598
DOI10.1016/J.PATCOG.2008.05.009zbMath1203.68305OpenAlexW2091405406MaRDI QIDQ941598
Publication date: 1 September 2008
Published in: Pattern Recognition (Search for Journal in Brave)
Full work available at URL: https://dspace.lboro.ac.uk/2134/8160
encodingwatermarkinginformation hidingownershipimage authenticationdigital rights managementtampering
Computing methodologies for image processing (68U10) Data encryption (aspects in computer science) (68P25)
Related Items (2)
Fragile watermarking for image authentication using the characteristic of SVD ⋮ A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration
Cites Work
- PCA-based web page watermarking
- A novel image watermarking scheme based on amplitude attack
- A robust associative watermarking technique based on similarity diagrams
- Fusion of color edge detection and color quantization for color image watermarking using principal axes analysis
- Circularly orthogonal moments for geometrically robust image watermarking
- Digital watermarking based on chaotic map and reference register
- Secure semi-blind watermarking based on iteration mapping and image features
- Lossless compression and information hiding in images
- Localized image watermarking based on feature points of scale-space representation
- Multiresolution fragile watermarking using complex chirp signals for content authentication
- Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
- Automatic image authentication and recovery using fractal code embedding and image inpainting
- Speaker identification security improvement by means of speech watermarking
- Lossless image compression and encryption using SCAN
This page was built for publication: Tampering with a watermarking-based image authentication scheme