AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
This paper proposes a new block mapping technique for image authentication and self-recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper coincidence problem can arise when modifications to an image affect the original block and its recovery data, resulting in the in...
| Main Authors: | Afrig, Aminuddin, Ernawan, Ferda |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier B.V.
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38921/ http://umpir.ump.edu.my/id/eprint/38921/1/AuSR3%20-%20A%20new%20block%20mapping%20technique%20for%20image%20authentication%20and%20self-recovery%20to%20avoid%20the%20tamper%20coincidence%20problem.pdf |
Similar Items
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022)
by: Aminuddin, Afrig, et al.
Published: (2022)
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024)
by: Afrig, Aminuddin, et al.
Published: (2024)
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Tamper Localization and Lossless Recovery Watermarking Scheme with ROI Segmentation and Multilevel Authentication
by: Liew, Siau-Chuin, et al.
Published: (2013)
by: Liew, Siau-Chuin, et al.
Published: (2013)
A blind recovery technique with integer wavelet transforms in image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Experiment of Tamper Detection and Recovery Watermarking in PACS
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
A new multi-frames watermarking technique for tamper detection and recovery
by: Khor, Hui Liang
Published: (2017)
by: Khor, Hui Liang
Published: (2017)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
by: Amrullah, Agit, et al.
Published: (2025)
by: Amrullah, Agit, et al.
Published: (2025)
Using Spiral Scan Technique for Medical Image Watermarking with Tamper Detection and Recovery
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Self-Recovery in Fragile Image Watermarking Using Integer Wavelet Transform
by: Ernawan, Ferda, et al.
Published: (2022)
by: Ernawan, Ferda, et al.
Published: (2022)
Reversible Medical Image Watermarking for Tamper Detection and Recovery with Run Length Encoding Compression
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Experiment of Tamper Detection and Recovery Watermarking in
Picture Archiving and Communication Systems
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
A block-based RDWT-SVD image watermarking method using human visual system characteristics
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
A Review of Reversible Medical Image Watermarking Scheme with Tamper Localization and Recovery Capability
by: Khor, Hui Liang, et al.
Published: (2014)
by: Khor, Hui Liang, et al.
Published: (2014)
Coincidence detection using spiking neurons with application to face recognition
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
Analysis of LTE performance of V2V communications on indonesia toll road
by: Amrullah, Agit, et al.
Published: (2023)
by: Amrullah, Agit, et al.
Published: (2023)
Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images
by: Hui, Liang Khor, et al.
Published: (2017)
by: Hui, Liang Khor, et al.
Published: (2017)
Region of interest-based tamper detection and lossless recovery watermarking scheme on MRI and X-ray medical images
by: Ooi, Jessie, et al.
Published: (2020)
by: Ooi, Jessie, et al.
Published: (2020)
Dual watermarking based on DCT with human visual characteristics for authentication and copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Fragile watermarking for image authentication using dyadic walsh ordering
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
by: Adi, Prajanto Wahyu, et al.
Published: (2023)
Reversible Medical Image Watermarking for Tamper Detection and Recovery
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
Block-based Tchebichef image watermarking scheme using psychovisual threshold
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
The Usage of Block Average Intensity in Tamper Localization for Image Watermarking
by: Liew, Siau-Chuin, et al.
Published: (2011)
by: Liew, Siau-Chuin, et al.
Published: (2011)
A novel approach towards tamper detection of digital holy Quran generation
by: Islam, Md. Milon, et al.
Published: (2020)
by: Islam, Md. Milon, et al.
Published: (2020)
Data tampering avoidance for food supply chain traceability system using blockchain technology
by: Rosli, Fahrulrazi
Published: (2019)
by: Rosli, Fahrulrazi
Published: (2019)
Robust Image Watermarking based on Psychovisual Threshold
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection
by: Ernawan, Ferda
Published: (2019)
by: Ernawan, Ferda
Published: (2019)
Tamper localization for medical images using cyclic redundancy check (CRC)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
by: Wan Nur Shakira Ain, Wan Ranizang
Published: (2013)
Evaluation of medical image watermarking with Tamper Detection
and Recovery (AW-TDR)
by: Mohamad Zain, Jasni, et al.
Published: (2007)
by: Mohamad Zain, Jasni, et al.
Published: (2007)
A New Psychovisual Threshold Technique in Image Processing Applications
by: Ernawan, Ferda
Published: (2016)
by: Ernawan, Ferda
Published: (2016)
An improved hiding information by modifying selected DWT coefficients in video steganography
by: Ernawan, Ferda
Published: (2023)
by: Ernawan, Ferda
Published: (2023)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Similar Items
-
AuSR2: Image watermarking technique for authentication and self-recovery with image texture preservation
by: Aminuddin, Afrig, et al.
Published: (2022) -
AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022) -
AuSR1 : Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking
by: Aminuddin, Afrig, et al.
Published: (2022) -
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
by: Afrig, Aminuddin, et al.
Published: (2024) -
Three layer authentications with a spiral block mapping to prove authenticity in medical images
by: Ernawan, Ferda, et al.
Published: (2022)