Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250900081-8.doi: 10.11896/jsjkx.250900081
• Information Security • Previous Articles
CHEN Hongxiang1, CHEN Guo1, ZHANG Hui1, WU Meiqi1, DING Qiqi1, LUO He1, WANG Hao1, GU Linming1, LUO Huiheng2, WANG Jinghan2
CLC Number:
| [1]MADHUSHREE B,BASANTH K H B,CHENNAMMA H R.An exhaustive review of authentication,tamper detection with localization and recovery techniques for medical images[J].Multimedia Tools and Applications,2024,83(13):39779-39821. [2]ALORAINI M,SHARIFZADEH M,SCHONFELD D.Sequential and patch analyses for object removal video forgery detection and localization[J].IEEE Transactions on Circuits and Systems for Video Technology,2021,31(3):917-930. [3]SHAIK A S,KARSH R K,ISLAM M,et al.A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication[J].Wireless Communications and Mobile Computing,2022,16(4):56-58. [4]BAPPY J H,SIMONS C,NATARAJ L,et al.Hybrid LSTM and encoder-decoder architecture for detection of image forgeries[J].IEEE Transactions on Image Processing,2019,28(7):3286-3300. [5]BHALERAO S,ANSARI I A,KUMAR A.A secure image watermarking for tamper detection and localization[J].Journal of Ambient Intelligence and Humanized Computing,2021,12(1):1057-1068. [6]SINHAL R,ANSARI I A.Multipurpose image watermarking:ownership check,tamper detection and self-recovery[J].Circuits,Systems,and Signal Processing,2022,41(6):3199-3221. [7]VAIDYA S P,KANDALA R N,CHANDRA M P,et al.A robust fragile watermarking approach for image tampering detection and restoration utilizing hybrid transforms[J].Scientific Reports,2025,15(1):1-24. [8]AHMADI S B B,ZHANG G,RABBANI M,et al.An intelligent and blind dual color image watermarking for authentication and copyright protection[J].Applied Intelligence,2021,51(3):1701-1732. [9]VAN S R G,TIRKEL A Z,OSBORNE C F.A digital water-mark[C]//Proceedings of 1st International Conference on Image Processing.1994:86-90. [10]LIN P L,HSIEH C K,HUANG P W.A hierarchical digital watermarking method for image tamper detection and recovery[J].Pattern Recognition,2005,38(12):2519-2529. [11]LEE T Y,LIN S D.Dual watermark for image tamper detection and recovery[J].Pattern Recognition,2008,41(11):3497-3506. [12]QIN C,JI P,ZHANG X,et al.Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy[J].Signal Processing,2017,138:280-293. [13]SARRESHTEDARI S,AKHAEE M A.A source-channel cod-ing approach to digital image protection and self-recovery[J].IEEE Transactions on Image Processing,2015,24(7):2266-2277. [14]BOLOURIAN H B,TAHERINIA A H,MOHAJERZADEH A H.TRLG:Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA[J].Information Sciences,2019,486:204-230. [15]SREENIVAS K,KAMAKSHIPRASAD V.Improved imagetamper localisation using chaotic maps and self-recovery[J].Journal of Visual Communication and Image Representation,2017,49:164-176. [16]PRASAD S,PAL A K.A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy[J].Multimedia Tools and Applications,2020,79(3):1673-1705. [17]LIU T,YUAN X.Adaptive feature calculation and diagonalmapping for successive recovery of tampered regions[J].IEEE Transactions on Circuits and Systems for Video Technology,2021,31(7):2617-2630. [18]CAO Y,ZHAO Y,WANG Q,et al.The evolution of quantum key distribution networks:On the road to the qinternet[J].IEEE Communications Surveys & Tutorials,2022,24(2):839-894. [19]MANNALATHA V,MISHRA S,PATHAK A.A comprehensive review of quantum random number generators:Concepts,classification and the origin of randomness[J].Quantum Information Processing,2023,22(12):439-445. [20]SPRUGNOLI R.Perfect hashing functions:a single probe retrie-ving method for static sets[J].Communications of the ACM,1977,20(11):841-850. [21]DU M W,HSIEH T M,JEA K F,et al.The study of a new perfect hash scheme[J].IEEE Transactions on Software Engineering,1983,9(3):305-313. [22]SHAPIRO J.Embedded image coding using zerotrees of wavelet coefficients[J].IEEE Transactions on Signal Processing,1993,41(12):3445-3462. [23]SAID A,PEARLMAN W A.A new,fast,and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Transactions on Circuits and Systems for Video Technology,1996,6(3):243-250. [24]BENDER W,GRUHL D,MORIMOTO N,et al.Techniques for data hiding[J].IBM Systems Journal,1996,35(34):313-336. [25]LIU Y X,YANG C N,SUN Q D,et al.Enhanced embedding capacity for the SMSD-based data-hiding method[J].Signal Processing:Image Communication,2019,78:216-222. [26]HE W,CAI Z.Reversible data hiding based on dual pairwise prediction-error expansion[J].IEEE Transactions on Image Processing,2021,30:5045-5055. [27]SHEN S Y,HUANG L H.A data hiding scheme using pixel value differencing and improving exploiting modification directions[J].Computers & Security,2015,48:131-141. [28]LIU Y J,CHANG C C,HUANG P C.Extended exploiting-modification-direction data hiding with high capacity[C]//Proceedings of the International Conference on Video and Image Processing.ACM,2017:151-155. [29]HAOUZIA A,NOUMEIR R.Methods for image authentica-tion:a survey[J].Multimedia Tools and Applications,2008,39(1):1-46. [30]PENG Y,NIU X,FU L,et al.Image authentication scheme based on reversible fragile watermarking with two images[J].Journal of Information Security and Applications,2018,40:236-246. [31]YIN Z,NIU X,ZHOU Z,et al.Improved reversible image authentication scheme[J].Cognitive Computation,2016,8(5):890-899. |
| [1] | CHENG Andong, XIE Sijiang, LIU Ang, FENG Yimeng. Efficient Quantum-secure Byzantine Fault Tolerance Consensus Mechanism Based on HotStuff [J]. Computer Science, 2024, 51(8): 429-439. |
| [2] | TIAN Yang, BI Xiu-li, XIAO Bin, LI Wei-sheng, MA Jian-feng. Image Seam Carving Tampering Detection by Discrete Tchebichef Transform [J]. Computer Science, 2021, 48(6A): 43-50. |
| [3] | ZHENG Qiu-mei, LIU Nan, WANG Feng-hua. Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm [J]. Computer Science, 2020, 47(10): 332-338. |
| [4] | ZHAO Yang, WANG Wei, DONG Rong, WANG Jing-shi and TANG Min. Compressed Sensing Recovery Algorithm for Region of Interests of MRI/MRA Images Based on NLTV and NESTA [J]. Computer Science, 2017, 44(9): 308-314. |
| [5] | SUI Li-li and WANG Chuan-jian. Checking Topological Integrity of Geographic Data Based on Fragile Watermarking [J]. Computer Science, 2016, 43(2): 183-187. |
| [6] | CUI Wen-cheng, LIANG Shuang-shuang, SHAO Hong and WANG Hai-yu. Research on Detection of Image Region-duplication Forgery Affected by Intrinsically Identical Objects [J]. Computer Science, 2015, 42(Z6): 226-230. |
| [7] | CUI Zhuang,LV Jun-bai and FENG Tao. Self-embedding Fragile Watermarking Based on DDWT Coding [J]. Computer Science, 2013, 40(8): 282-284. |
| [8] | . Research and Design of Multimedia Digital Products Copyright Protection Model [J]. Computer Science, 2013, 40(1): 98-102. |
| [9] | XIAO Lei. Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types [J]. Computer Science, 2010, 37(2): 286-289. |
| [10] | . [J]. Computer Science, 2008, 35(3): 13-17. |
| [11] | . [J]. Computer Science, 2008, 35(1): 258-260. |
| [12] | . [J]. Computer Science, 2007, 34(12): 252-256. |
|
||