X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (569) 569
Conference Proceeding (426) 426
Dissertation (64) 64
Publication (17) 17
Book Chapter (11) 11
Government Document (1) 1
Magazine Article (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
fragile watermarking (485) 485
watermarking (472) 472
authentication (378) 378
image authentication (235) 235
semi-fragile watermarking (176) 176
tamper detection (169) 169
engineering, electrical & electronic (152) 152
robustness (128) 128
computer science, information systems (117) 117
digital watermarking (117) 117
computer science (116) 116
fragile watermark (99) 99
images (95) 95
computer science, software engineering (94) 94
algorithms (92) 92
computer science, theory & methods (81) 81
image coding (81) 81
scheme (81) 81
recovery (78) 78
security (70) 70
analysis (60) 60
computer communication networks (56) 56
tamper localization (55) 55
localization (53) 53
multimedia information systems (53) 53
chaos (52) 52
transform coding (51) 51
robust (50) 50
psnr (48) 48
cryptography (47) 47
image processing (47) 47
semi-fragile watermark (47) 47
special purpose and application-based systems (47) 47
wasserzeichen (47) 47
discrete wavelet transforms (46) 46
quantization (45) 45
copyright protection (44) 44
discrete cosine transforms (43) 43
fragile (43) 43
multimedia (43) 43
semi-fragile (43) 43
computer science, artificial intelligence (40) 40
content authentication (39) 39
data structures, cryptology and information theory (39) 39
protection (39) 39
vector quantization (39) 39
image restoration (38) 38
digital watermarks (37) 37
telecommunications (37) 37
data mining (36) 36
image detection (36) 36
studies (36) 36
digital images (35) 35
singular value decomposition (34) 34
methods (33) 33
self-embedding (33) 33
self-recovery (33) 33
discrete wavelet transform (32) 32
image quality (32) 32
pixel (32) 32
authentifizierung (31) 31
wavelet transform (31) 31
optics (30) 30
integrity (29) 29
robust watermarking (29) 29
tampering detection (29) 29
algorithm (27) 27
engineering (27) 27
feature extraction (27) 27
restoration capability (27) 27
steganography (27) 27
data security (26) 26
tamper recovery (25) 25
digital imaging (24) 24
digital signatures (24) 24
authentisierung (23) 23
information security (23) 23
dct (22) 22
digital signature (22) 22
embedding (22) 22
fragile watermarking scheme (22) 22
mechanism (22) 22
signal processing (22) 22
usage (22) 22
blocking (21) 21
data hiding (21) 21
image reconstruction (21) 21
transforms (21) 21
discrete cosine transform (20) 20
electrical engineering (20) 20
image recovery (20) 20
robust watermark (20) 20
transform (20) 20
internet (19) 19
mathematical analysis (19) 19
wavelet transforms (19) 19
distortion (18) 18
dwt (18) 18
fragility (18) 18
image watermarking (18) 18
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Signal Processing, ISSN 0165-1684, 02/2016, Volume 119, pp. 102 - 114
We present an algorithm for fragile watermarking of color, or multi-channel, images either in uncompressed format, in lossless compressed format, or in... 
Information hiding | Compressed image | Fragile watermarking | Genetic Algorithms | Karhunen–Loève transform | Color image | Karhunen-Loève transform | AUTHENTICATION | ALGORITHM | Color linage | Karhunen-Loeve transform | TRANSFORM DOMAIN | ENGINEERING, ELECTRICAL & ELECTRONIC | Algorithms
Journal Article
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni, ISSN 0529-6579, 07/2018, Volume 57, Issue 4, pp. 1 - 8
Journal Article
IEEE Transactions on Multimedia, ISSN 1520-9210, 12/2008, Volume 10, Issue 8, pp. 1490 - 1499
Journal Article
Signal Processing, ISSN 0165-1684, 09/2017, Volume 138, pp. 280 - 293
In this paper, we propose a new fragile watermarking scheme with high-quality recovery capability based on overlapping embedding strategy. The block-wise... 
Overlapping embedding | Tampering localization | Fragile watermarking | Pixel-wise recovery | SCHEME | LOCALIZATION | RESTORATION CAPABILITY | MECHANISM | TAMPER DETECTION | ENGINEERING, ELECTRICAL & ELECTRONIC | Information science
Journal Article
Signal Processing, ISSN 0165-1684, 2009, Volume 89, Issue 4, pp. 675 - 679
This paper proposes a novel fragile watermarking scheme with a hierarchical mechanism, in which pixel-derived and block-derived watermark data are carried by... 
Fragile watermarking | Tampered-pixel localization | Image restoration | IMAGE AUTHENTICATION | ENGINEERING, ELECTRICAL & ELECTRONIC | Recovering | Errors | Rest | Receivers | Watermarking | Blocking | Signal processing | Pixels
Journal Article
Signal Processing: Image Communication, ISSN 0923-5965, 2009, Volume 24, Issue 7, pp. 587 - 597
Fragile digital watermarking has been applied for authentication and alteration detection in images. Utilizing the cosine and Hartley transforms over finite... 
Fragile watermarking | Finite field trigonometry | Number theoretic transforms | SCHEME | FAST ALGORITHMS | AUTHENTICATION | MULTIPLICATION | DIGITAL WATERMARKING | NUMBER-THEORETIC TRANSFORMS | ENGINEERING, ELECTRICAL & ELECTRONIC | Data encryption chips | Usage
Journal Article
IEEE Transactions on Image Processing, ISSN 1057-7149, 10/2001, Volume 10, Issue 10, pp. 1579 - 1592
Journal Article
IEEE Transactions on Image Processing, ISSN 1057-7149, 8/2019, pp. 1 - 1
Reversible color-to-grayscale conversion (RCGC) is a method that embeds the chromatic information of a full color image into its grayscale version such that... 
Color Palette | Reversible Color-to-grayscale Conversion | Color | Watermarking | Gray-scale | Error Diffusion | Indexes | Image reconstruction | Color Quantization | Halftoning | Fragile watermark | Image color analysis | Noise Shaping | Colored noise
Journal Article
by Bao, P and Xiaohu Ma
IEEE Transactions on Circuits and Systems for Video Technology, ISSN 1051-8215, 01/2005, Volume 15, Issue 1, pp. 96 - 102
Journal Article
IEEE Transactions on Multimedia, ISSN 1520-9210, 12/2008, Volume 10, Issue 8, pp. 1513 - 1527
Journal Article
Electronics Letters, ISSN 0013-5194, 11/2015, Volume 51, Issue 23, pp. 1873 - 1875
A watermarking-based image authentication scheme in the discrete cosine transform (DCT) domain robust to JPEG compression is presented. The binary... 
Image and vision processing and display technology | TAMPER DETECTION | FRAGILE WATERMARKING | ENGINEERING, ELECTRICAL & ELECTRONIC | JPEG encoders-decoders | Compressing | Quality factor | Modulation | Authentication | Watermarking | Images | Image compression
Journal Article
Computer-Aided Design, ISSN 0010-4485, 07/2013, Volume 45, Issue 7, pp. 1042 - 1052
The Computer-Aided Plant Design (CAPD) model characterizes its peculiar complex topology among a tremendous number of plant components under complex... 
Topological integrity | Topological tagging | Process plant | Connection points | Semi-fragile watermarking | Watermarking | DESIGN | CAD | LAYOUT | COMPONENTS | MESH WATERMARKING | COMPUTER SCIENCE, SOFTWARE ENGINEERING | SURFACES | Algorithms | Simplification | Authentication | Mathematical models | Topology | Joints | Computer aided design
Journal Article
Journal Article
Information Sciences, ISSN 0020-0255, 07/2012, Volume 195, pp. 62 - 90
An original image is divided in smaller images called blocks, compressed with a fuzzy transform to images of sizes 2 × 2 for which we apply a fragile... 
FCM | Fragile watermarking | Fuzzy transform | Tamper detection | SCHEME | LOCALIZATION | AUTHENTICATION | CODING/DECODING PROCESSES | COMPUTER SCIENCE, INFORMATION SYSTEMS | RELATION EQUATIONS | OWNERSHIP
Journal Article
Information Sciences, ISSN 0020-0255, 12/2016, Volume 373, pp. 233 - 250
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.