|
[1] D. Singh and S. Singh, “Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability,” J. Vis. Commun. Image Represent., vol. 38, pp. 775–789, 2016. [2] C. Qin, H. Wang, X. Zhang, and X. Sun, “Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode,” Information Sciences, vol. 373, pp. 233–250, 2016. [3] N. Wang, Z. Li, X. Cheng, and Y. Chen, “Dual watermarking algorithm based on singular value decomposition and compressive sensing,” in 2017 IEEE 17th International Conference on Communication Technology (ICCT), pp. 1763–1767, 2017. [4] H. Rhayma, A. Makhloufi, H. Hamam, and A. ben Hmida, “Semi fragile watermarking scheme for image recovery in wavelet domain,” in 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), pp. 1–5, 2018. [5] L. Rakhmawati, Wirawan, and Suwadi, “Image fragile watermarking with two authentication components for tamper detection and recovery,” in 2018 International Conference on Intelligent Autonomous Systems (ICoIAS), pp. 35–38, 2018. [6] M. Hamid and C. Wang, “Adaptive image self-recovery based on feature extraction in the dct domain,” IEEE Access, vol. 6, pp. 67156–67165, 2018. [7] Y. Chao, S. Liu, and H. Liu, “A novel semi-fragile watermarking algorithm with tamper localization and self-recovery,” in 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp. 186–190, 2018. [8] R. Sinhal, I. Ansari, and C. Ahn, “Blind image watermarking for localization and restoration of color images,” IEEE Access, vol. 8, pp. 200157–200169, 2020. [9] J. Molina-Garcia, B. Garcia-Salgado, V. Ponomaryov, R. Reyes-Reyes, S. Sadovnychiy, and C. Cruz-Ramos, “An effective fragile watermarking scheme for color image tampering detection and self-recovery,” Signal Processing: Image Communication, vol. 81, p. 115725, 2020. [10] F. Tohidi, M. Paul, and M. Hooshmandasl, “Detection and recovery of higher tampered images using novel feature and compression strategy,” IEEE Access, vol. 9, pp. 57510–57528, 2021. [11] A. Afrig and E. Ferda, “Ausr1: Authentication and self-recovery using a new image inpainting technique with lsb shifting in fragile image watermarking,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, Part B, pp. 5822–5840, 2022. [12] P. Lin, C. Hsieh, and P. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005. [13] T. Lee and S. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, pp. 3497–3506, 2008. [14] K. Liu, “Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique,” IET Image Processing, vol. 8, pp. 363–372, 2014. [15] S. Sarreshtedari and M. Akhaee, “A source-channel coding approach to digital image protection and self-recovery,” IEEE Transactions on Image Processing, vol. 24, no. 7, pp. 2266–2277, 2015. [16] S. Dadkhah, A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, “An effective svd-based image tampering detection and self-recovery using active watermarking,” Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197–1210, 2014. [17] M. Fan and H. Wang, “An enhanced fragile watermarking scheme to digital image protection and self-recovery,” Signal Processing: Image Communication, vol. 66, pp. 19–29, 2018. [18] X. Tong, Y. Liu, M. Zhang, and Y. Chen, “A novel chaos-based fragile watermarking for image tampering detection and self-recovery,” Signal Processing: Image Communication, vol. 28, no. 3, pp. 301–308, 2013. [19] S. Qiang and Z. Hongbin, “Image tamper detection and recovery using dual watermark,” 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), 2010. [20] M. Moonsazadeh and G. Ekbatanifard, “An improved robust image watermarking method using dct and ycocg-r color space,” Optik, vol. 140, pp. 975–988, 2017. [21] W. Tai and Z. Liao, “Image self-recovery with watermark self-embedding,” Signal Processing: Image Communication, vol. 65, pp. 11–25, 2018. [22] A. A. V.I. Arnold Ergodic Problems of Classical Mechanics, vol. 9, 1968. [23] A. Telea, “An image inpainting technique based on the fast marching method,” Journal of Graphics Tools, vol. 9, 01 2004. [24] A. G. Weber, “The usc-sipi image database: Version 6,” 2018. The USCSIPI Image Database Volume 3: Miscellaneous, https://sipi.usc.edu/database/database.php?volume=misc. |