Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering

The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery tec...

Full description

Saved in:
Bibliographic Details
Published inMultimedia tools and applications Vol. 78; no. 22; pp. 32523 - 32563
Main Authors Abdelhakim, Assem, Saleh, Hassan I., Abdelhakim, Mai
Format Journal Article
LanguageEnglish
Published New York Springer US 01.11.2019
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K -means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively.
AbstractList The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K-means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively.
The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K -means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively.
Author Abdelhakim, Mai
Abdelhakim, Assem
Saleh, Hassan I.
Author_xml – sequence: 1
  givenname: Assem
  orcidid: 0000-0003-0730-2012
  surname: Abdelhakim
  fullname: Abdelhakim, Assem
  email: assemh81@gmail.com
  organization: Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT), Egyptian Atomic Energy Authority
– sequence: 2
  givenname: Hassan I.
  surname: Saleh
  fullname: Saleh, Hassan I.
  organization: Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT), Egyptian Atomic Energy Authority
– sequence: 3
  givenname: Mai
  surname: Abdelhakim
  fullname: Abdelhakim, Mai
  organization: Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT), Egyptian Atomic Energy Authority, School of Computing and Information, University of Pittsburgh
BookMark eNp9kM1OwzAQhC0EEm3hBThZ4mzwT2onR1RRQFTiAmfLcdYlJY2DnbYq4uFxWiRunHa1uzOj_cbotPUtIHTF6A2jVN1GxmjGCWUFoarIJREnaMSmShClODtNvcgpUVPKztE4xhWlTE55NkLf82CWdQN4Z3oIaxM-6naJnQ-4Xpsl4N6sOwi4gh5sX_sWm7bCjbemqb_MYbCr-3cMzg37LeAA1m8h7LE1nSnrpu73eBMH02eyBtNGbJtNTFlpdIHOnGkiXP7WCXqb37_OHsni5eFpdrcgVrCiJy6j0mRMZnnFVaXKrGBSGsHzLC_AOsctZ6UTVEhpgZZUiRyMLVQCUUlVOTFB10ffLvjPDcRer_wmtClScy4LzqdJmq748coGH2MAp7uQIIS9ZlQPlPWRsk6U9YGyFkkkjqLYDR9B-LP-R_UDxAOD4g
CitedBy_id crossref_primary_10_3390_met13050881
crossref_primary_10_1016_j_jisa_2023_103425
crossref_primary_10_1109_ACCESS_2020_3022779
crossref_primary_10_1002_cpe_7191
crossref_primary_10_3390_e25030508
crossref_primary_10_1016_j_compeleceng_2023_108783
crossref_primary_10_1016_j_eswa_2023_121903
crossref_primary_10_1007_s11042_023_15806_y
crossref_primary_10_1007_s11042_021_11018_4
crossref_primary_10_1016_j_jisa_2023_103619
crossref_primary_10_1016_j_jvcir_2022_103437
crossref_primary_10_1007_s11042_022_13312_1
crossref_primary_10_1109_TCSVT_2020_2969464
crossref_primary_10_1007_s11042_021_11529_0
crossref_primary_10_1016_j_eswa_2023_120228
crossref_primary_10_1016_j_cosrev_2020_100287
crossref_primary_10_1007_s11042_020_10210_2
crossref_primary_10_1007_s11042_022_13630_4
crossref_primary_10_1007_s11042_024_18908_3
crossref_primary_10_1016_j_jksuci_2023_101795
crossref_primary_10_1016_j_micpro_2022_104483
crossref_primary_10_1109_TCSVT_2020_3032455
crossref_primary_10_1109_ACCESS_2020_3047270
Cites_doi 10.1109/MAES.2010.5467652
10.1016/j.patcog.2007.06.003
10.1016/j.dsp.2010.04.006
10.1109/LSP.2006.879829
10.1016/j.sigpro.2017.03.033
10.1016/j.patrec.2004.08.017
10.1109/TIFS.2011.2162950
10.1016/j.jisa.2014.07.004
10.1007/s11042-015-3218-9
10.1109/TIP.2003.819861
10.1109/TIFS.2011.2159208
10.1109/LSP.2007.896436
10.1109/TIP.2010.2066981
10.1109/LSP.2010.2090041
10.1016/j.aeue.2008.05.010
10.1109/TMM.2008.2007334
10.1016/j.aeue.2016.05.003
10.1007/s11760-012-0312-6
10.1109/ACCESS.2018.2799240
10.1007/s11042-015-2786-z
10.1016/j.patcog.2005.02.007
10.1049/iet-ipr.2013.0646
10.1109/TIP.2012.2227769
10.1016/j.sigpro.2009.07.007
10.1109/TIFS.2008.926994
10.1109/TIP.2002.1014990
10.1016/j.jvcir.2016.04.023
10.1109/83.951543
10.1007/s11042-015-3010-x
10.1016/j.aeue.2015.10.006
10.1109/5.982406
10.1049/iet-ipr.2011.0574
10.1016/j.displa.2017.01.001
10.1016/j.measurement.2016.03.053
10.1007/s13042-015-0329-6
10.1109/MSP.2008.931079
10.1016/j.ins.2012.01.014
10.1109/BICTA.2007.4806454
10.1109/GCCE.2014.7031326
10.1007/978-3-642-37463-0_10
10.1109/ICIIP.2015.7414830
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2019
Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019
– notice: Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved.
DBID AAYXX
CITATION
3V.
7SC
7WY
7WZ
7XB
87Z
8AL
8AO
8FD
8FE
8FG
8FK
8FL
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
GUQSH
HCIFZ
JQ2
K60
K6~
K7-
L.-
L7M
L~C
L~D
M0C
M0N
M2O
MBDVC
P5Z
P62
PQBIZ
PQBZA
PQEST
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s11042-019-07986-3
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest_ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Database‎ (1962 - current)
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
ProQuest Business Premium Collection
Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
Research Library Prep
SciTech Premium Collection (Proquest) (PQ_SDU_P3)
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global (ProQuest)
Computing Database
ProQuest research library
Research Library (Corporate)
ProQuest Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Central Korea
ProQuest Research Library
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ABI/INFORM Global (Corporate)

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1573-7721
EndPage 32563
ExternalDocumentID 10_1007_s11042_019_07986_3
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
1N0
1SB
2.D
203
28-
29M
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3EH
3V.
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
7WY
8AO
8FE
8FG
8FL
8G5
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AABYN
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AAOBN
AAPBV
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAWWR
AAYFA
AAYIU
AAYQN
AAYTO
ABBBX
ABBXA
ABDZT
ABECU
ABFGW
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKAS
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFO
ACGFS
ACHSB
ACHXU
ACIGE
ACIPQ
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACREN
ACSNA
ACTTH
ACVWB
ACWMK
ADGRI
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMDM
ADOXG
ADRFC
ADTPH
ADURQ
ADYFF
ADYOE
ADZKW
AEBTG
AEEQQ
AEFIE
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AENEX
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEVLU
AEVTX
AEXYK
AEYWE
AFEXP
AFGCZ
AFKRA
AFLOW
AFNRJ
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGBP
AGGDS
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
BA0
BBWZM
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GUQSH
GXS
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITG
ITH
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K60
K6V
K6~
K7-
KDC
KOV
KOW
LAK
LLZTM
M0C
M0N
M2O
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P62
P9O
PF0
PQBIZ
PQQKQ
PROAC
PT4
PT5
Q2X
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TH9
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UNUBA
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8P
Z8Q
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~EX
AACDK
AAEOY
AAJBT
AASML
AAYXX
ABAKF
ACAOD
ACDTI
ACZOJ
AEFQL
AEMSY
AFBBN
AGQEE
AGRTI
AIGIU
CITATION
H13
PQBZA
7SC
7XB
8AL
8FD
8FK
AAYZH
JQ2
L.-
L7M
L~C
L~D
MBDVC
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c319t-f406a41648d27d7b49166a328489ecff2c21bf30366ce0b0738eac97798d67df3
IEDL.DBID U2A
ISSN 1380-7501
IngestDate Mon Nov 04 11:04:56 EST 2024
Thu Sep 12 19:19:20 EDT 2024
Sat Dec 16 12:03:51 EST 2023
IsPeerReviewed true
IsScholarly true
Issue 22
Keywords Unsupervised machine learning
Tampering localization
Discrete Cosine Transform
Fragile watermarking
K-means clustering
Image authentication
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-f406a41648d27d7b49166a328489ecff2c21bf30366ce0b0738eac97798d67df3
ORCID 0000-0003-0730-2012
PQID 2269225366
PQPubID 54626
PageCount 41
ParticipantIDs proquest_journals_2269225366
crossref_primary_10_1007_s11042_019_07986_3
springer_journals_10_1007_s11042_019_07986_3
PublicationCentury 2000
PublicationDate 2019-11-01
PublicationDateYYYYMMDD 2019-11-01
PublicationDate_xml – month: 11
  year: 2019
  text: 2019-11-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle An International Journal
PublicationTitle Multimedia tools and applications
PublicationTitleAbbrev Multimed Tools Appl
PublicationYear 2019
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References De Vleeschouwer, Delaigle, Macq (CR6) 2002; 90
Zhang, Qian, Ren, Feng (CR40) 2011; 6
CR19
Bohra, Farooq (CR2) 2009; 63
Yang, Kot (CR38) 2006; 13
Farid (CR9) 2009; 26
CR17
CR14
Qin, Ji, Zhang, Dong, Wang (CR28) 2017; 138
Korus, Dziech (CR18) 2013; 22
CR12
CR10
CR31
Lin, Hsieh, Huang (CR21) 2005; 38
CR30
Suthaharan (CR34) 2004; 25
Zhao, Chen, Zhu, Tan, Yu (CR44) 2011; 18
Zhang, Wang (CR41) 2007; 14
Zhang, Wang, Qian, Feng (CR43) 2011; 20
Zhang, Wang (CR42) 2008; 10
Mahdian, Saic (CR23) 2010; 25
Qian, Feng, Zhang, Wang (CR26) 2011; 21
Yang, Shen (CR39) 2010; 90
Cao, An, Wang, Ye, Wang (CR3) 2017; 46
Hsu, Tu (CR16) 2016; 88
Ho, Zhu, Shen, Marziliano (CR15) 2008; 3
Di Martino, Sessa (CR7) 2012; 195
Qin, Ji, Wang, Chang (CR27) 2017; 76
Benrhouma, Hermassi, El-Latif, Belghith (CR1) 2016; 75
He, Chen, Tai, Kalker, Zhang (CR13) 2012; 7
Singh, Singh (CR33) 2017; 76
Zhou, Yu, Wang, Wu, Luo, Sun (CR45) 2016; 70
Wong, Memon (CR37) 2001; 10
Chang, Fan, Tai (CR5) 2008; 41
CR20
Shehab, Elhoseny, Muhammad, Sangaiah, Yang, Huang, Hou (CR29) 2018; 6
Celik, Sharma, Saber, Tekalp (CR4) 2002; 11
Walia, Suneja (CR35) 2014; 8
Liu (CR22) 2012; 6
Mehta, Rajpal, Vishwakarma (CR24) 2018; 9
El'arbi, Amar (CR8) 2014; 8
Ghosal, Mandal (CR11) 2014; 19
Singh, Singh (CR32) 2016; 38
Nguyen, Chang, Yang (CR25) 2016; 70
Wang, Bovik, Sheikh, Simoncelli (CR36) 2004; 13
Y Zhao (7986_CR44) 2011; 18
X Zhang (7986_CR43) 2011; 20
M El'arbi (7986_CR8) 2014; 8
C-C Chang (7986_CR5) 2008; 41
H Farid (7986_CR9) 2009; 26
H Yang (7986_CR38) 2006; 13
X Zhang (7986_CR42) 2008; 10
A Shehab (7986_CR29) 2018; 6
S Suthaharan (7986_CR34) 2004; 25
B Mahdian (7986_CR23) 2010; 25
K-C Liu (7986_CR22) 2012; 6
C Qin (7986_CR27) 2017; 76
MU Celik (7986_CR4) 2002; 11
A Bohra (7986_CR2) 2009; 63
X Zhang (7986_CR41) 2007; 14
PW Wong (7986_CR37) 2001; 10
C-W Yang (7986_CR39) 2010; 90
S Ghosal (7986_CR11) 2014; 19
C Qin (7986_CR28) 2017; 138
C-S Hsu (7986_CR16) 2016; 88
T-S Nguyen (7986_CR25) 2016; 70
Z Qian (7986_CR26) 2011; 21
PL Lin (7986_CR21) 2005; 38
Z Wang (7986_CR36) 2004; 13
7986_CR20
7986_CR14
C De Vleeschouwer (7986_CR6) 2002; 90
7986_CR19
W Zhou (7986_CR45) 2016; 70
7986_CR17
AT Ho (7986_CR15) 2008; 3
O Benrhouma (7986_CR1) 2016; 75
E Walia (7986_CR35) 2014; 8
P Korus (7986_CR18) 2013; 22
D Singh (7986_CR33) 2017; 76
H He (7986_CR13) 2012; 7
R Mehta (7986_CR24) 2018; 9
7986_CR30
F Di Martino (7986_CR7) 2012; 195
D Singh (7986_CR32) 2016; 38
X Zhang (7986_CR40) 2011; 6
7986_CR12
F Cao (7986_CR3) 2017; 46
7986_CR10
7986_CR31
References_xml – volume: 25
  start-page: 18
  issue: 4
  year: 2010
  end-page: 24
  ident: CR23
  article-title: Blind methods for detecting image fakery
  publication-title: IEEE Aerosp Electron Syst Mag
  doi: 10.1109/MAES.2010.5467652
  contributor:
    fullname: Saic
– volume: 41
  start-page: 654
  issue: 2
  year: 2008
  end-page: 661
  ident: CR5
  article-title: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2007.06.003
  contributor:
    fullname: Tai
– volume: 21
  start-page: 278
  issue: 2
  year: 2011
  end-page: 286
  ident: CR26
  article-title: Image self-embedding with high-quality restoration capability
  publication-title: Digital Signal Processing
  doi: 10.1016/j.dsp.2010.04.006
  contributor:
    fullname: Wang
– volume: 13
  start-page: 741
  issue: 12
  year: 2006
  end-page: 744
  ident: CR38
  article-title: Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
  publication-title: IEEE signal Processing Letters
  doi: 10.1109/LSP.2006.879829
  contributor:
    fullname: Kot
– volume: 138
  start-page: 280
  year: 2017
  end-page: 293
  ident: CR28
  article-title: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.03.033
  contributor:
    fullname: Wang
– volume: 25
  start-page: 1893
  issue: 16
  year: 2004
  end-page: 1903
  ident: CR34
  article-title: Fragile image watermarking using a gradient image for improved localization and security
  publication-title: Pattern Recogn Lett
  doi: 10.1016/j.patrec.2004.08.017
  contributor:
    fullname: Suthaharan
– ident: CR14
– volume: 7
  start-page: 185
  issue: 1
  year: 2012
  end-page: 196
  ident: CR13
  article-title: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2162950
  contributor:
    fullname: Zhang
– volume: 19
  start-page: 272
  issue: 4–5
  year: 2014
  end-page: 281
  ident: CR11
  article-title: Binomial transform based fragile watermarking for image authentication
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2014.07.004
  contributor:
    fullname: Mandal
– ident: CR12
– ident: CR30
– ident: CR10
– volume: 76
  start-page: 2267
  issue: 2
  year: 2017
  end-page: 2287
  ident: CR27
  article-title: Fragile image watermarking scheme based on VQ index sharing and self-embedding
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-3218-9
  contributor:
    fullname: Chang
– volume: 13
  start-page: 600
  issue: 4
  year: 2004
  end-page: 612
  ident: CR36
  article-title: Image quality assessment: from error visibility to structural similarity
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2003.819861
  contributor:
    fullname: Simoncelli
– volume: 6
  start-page: 1223
  issue: 4
  year: 2011
  end-page: 1232
  ident: CR40
  article-title: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2159208
  contributor:
    fullname: Feng
– volume: 14
  start-page: 727
  issue: 10
  year: 2007
  end-page: 730
  ident: CR41
  article-title: Statistical fragile watermarking capable of locating individual tampered pixels
  publication-title: IEEE Signal Processing Letters
  doi: 10.1109/LSP.2007.896436
  contributor:
    fullname: Wang
– volume: 20
  start-page: 485
  issue: 2
  year: 2011
  end-page: 495
  ident: CR43
  article-title: Reference sharing mechanism for watermark self-embedding
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2010.2066981
  contributor:
    fullname: Feng
– volume: 18
  start-page: 19
  issue: 1
  year: 2011
  end-page: 22
  ident: CR44
  article-title: Binocular just-noticeable-difference model for stereoscopic images
  publication-title: IEEE Signal Processing Letters
  doi: 10.1109/LSP.2010.2090041
  contributor:
    fullname: Yu
– volume: 63
  start-page: 703
  issue: 8
  year: 2009
  end-page: 707
  ident: CR2
  article-title: Blind self-authentication of images for robust watermarking using integer wavelet transform
  publication-title: AEU-International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2008.05.010
  contributor:
    fullname: Farooq
– volume: 10
  start-page: 1490
  issue: 8
  year: 2008
  end-page: 1499
  ident: CR42
  article-title: Fragile watermarking with error-free restoration capability
  publication-title: IEEE Transactions on Multimedia
  doi: 10.1109/TMM.2008.2007334
  contributor:
    fullname: Wang
– volume: 70
  start-page: 1055
  issue: 8
  year: 2016
  end-page: 1061
  ident: CR25
  article-title: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain
  publication-title: AEU-International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2016.05.003
  contributor:
    fullname: Yang
– volume: 8
  start-page: 859
  issue: 5
  year: 2014
  end-page: 872
  ident: CR35
  article-title: A robust watermark authentication technique based on Weber’s descriptor
  publication-title: SIViP
  doi: 10.1007/s11760-012-0312-6
  contributor:
    fullname: Suneja
– ident: CR19
– volume: 6
  start-page: 10269
  year: 2018
  end-page: 10278
  ident: CR29
  article-title: Secure and robust fragile watermarking scheme for medical images
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2799240
  contributor:
    fullname: Hou
– volume: 75
  start-page: 8695
  issue: 14
  year: 2016
  end-page: 8718
  ident: CR1
  article-title: Chaotic watermark for blind forgery detection in images
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2786-z
  contributor:
    fullname: Belghith
– volume: 38
  start-page: 2519
  issue: 12
  year: 2005
  end-page: 2529
  ident: CR21
  article-title: A hierarchical digital watermarking method for image tamper detection and recovery
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2005.02.007
  contributor:
    fullname: Huang
– volume: 8
  start-page: 619
  issue: 11
  year: 2014
  end-page: 626
  ident: CR8
  article-title: Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain
  publication-title: IET Image Process
  doi: 10.1049/iet-ipr.2013.0646
  contributor:
    fullname: Amar
– volume: 22
  start-page: 1134
  issue: 3
  year: 2013
  end-page: 1147
  ident: CR18
  article-title: Efficient method for content reconstruction with self-embedding
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2012.2227769
  contributor:
    fullname: Dziech
– volume: 90
  start-page: 331
  issue: 1
  year: 2010
  end-page: 343
  ident: CR39
  article-title: Recover the tampered image based on VQ indexing
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2009.07.007
  contributor:
    fullname: Shen
– volume: 3
  start-page: 567
  issue: 3
  year: 2008
  end-page: 569
  ident: CR15
  article-title: Fragile Watermarking Based on Encoding of the Zeroes of the $ z $-Transform
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2008.926994
  contributor:
    fullname: Marziliano
– ident: CR17
– ident: CR31
– volume: 11
  start-page: 585
  issue: 6
  year: 2002
  end-page: 595
  ident: CR4
  article-title: Hierarchical watermarking for secure image authentication with localization
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2002.1014990
  contributor:
    fullname: Tekalp
– volume: 38
  start-page: 775
  year: 2016
  end-page: 789
  ident: CR32
  article-title: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2016.04.023
  contributor:
    fullname: Singh
– volume: 10
  start-page: 1593
  issue: 10
  year: 2001
  end-page: 1601
  ident: CR37
  article-title: Secret and public key image watermarking schemes for image authentication and ownership verification
  publication-title: IEEE Trans Image Process
  doi: 10.1109/83.951543
  contributor:
    fullname: Memon
– volume: 76
  start-page: 953
  issue: 1
  year: 2017
  end-page: 977
  ident: CR33
  article-title: DCT based efficient fragile watermarking scheme for image authentication and restoration
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-3010-x
  contributor:
    fullname: Singh
– volume: 70
  start-page: 77
  issue: 1
  year: 2016
  end-page: 84
  ident: CR45
  article-title: Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images
  publication-title: AEU-International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2015.10.006
  contributor:
    fullname: Sun
– volume: 90
  start-page: 64
  issue: 1
  year: 2002
  end-page: 77
  ident: CR6
  article-title: Invisibility and application functionalities in perceptual watermarking an overview
  publication-title: Proc IEEE
  doi: 10.1109/5.982406
  contributor:
    fullname: Macq
– volume: 6
  start-page: 445
  issue: 5
  year: 2012
  end-page: 454
  ident: CR22
  article-title: Colour image watermarking for tamper proofing and pattern-based recovery
  publication-title: IET Image Process
  doi: 10.1049/iet-ipr.2011.0574
  contributor:
    fullname: Liu
– volume: 46
  start-page: 52
  year: 2017
  end-page: 60
  ident: CR3
  article-title: Hierarchical recovery for tampered images based on watermark self-embedding
  publication-title: Displays
  doi: 10.1016/j.displa.2017.01.001
  contributor:
    fullname: Wang
– volume: 88
  start-page: 287
  year: 2016
  end-page: 296
  ident: CR16
  article-title: Image tamper detection and recovery using adaptive embedding rules
  publication-title: Measurement
  doi: 10.1016/j.measurement.2016.03.053
  contributor:
    fullname: Tu
– volume: 9
  start-page: 145
  issue: 1
  year: 2018
  end-page: 161
  ident: CR24
  article-title: Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-015-0329-6
  contributor:
    fullname: Vishwakarma
– volume: 26
  start-page: 16
  issue: 2
  year: 2009
  end-page: 25
  ident: CR9
  article-title: Image forgery detection
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2008.931079
  contributor:
    fullname: Farid
– ident: CR20
– volume: 195
  start-page: 62
  year: 2012
  end-page: 90
  ident: CR7
  article-title: Fragile watermarking tamper detection with images compressed by fuzzy transform
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2012.01.014
  contributor:
    fullname: Sessa
– volume: 90
  start-page: 331
  issue: 1
  year: 2010
  ident: 7986_CR39
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2009.07.007
  contributor:
    fullname: C-W Yang
– volume: 63
  start-page: 703
  issue: 8
  year: 2009
  ident: 7986_CR2
  publication-title: AEU-International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2008.05.010
  contributor:
    fullname: A Bohra
– volume: 21
  start-page: 278
  issue: 2
  year: 2011
  ident: 7986_CR26
  publication-title: Digital Signal Processing
  doi: 10.1016/j.dsp.2010.04.006
  contributor:
    fullname: Z Qian
– ident: 7986_CR17
– volume: 38
  start-page: 2519
  issue: 12
  year: 2005
  ident: 7986_CR21
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2005.02.007
  contributor:
    fullname: PL Lin
– volume: 8
  start-page: 859
  issue: 5
  year: 2014
  ident: 7986_CR35
  publication-title: SIViP
  doi: 10.1007/s11760-012-0312-6
  contributor:
    fullname: E Walia
– volume: 20
  start-page: 485
  issue: 2
  year: 2011
  ident: 7986_CR43
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2010.2066981
  contributor:
    fullname: X Zhang
– volume: 70
  start-page: 77
  issue: 1
  year: 2016
  ident: 7986_CR45
  publication-title: AEU-International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2015.10.006
  contributor:
    fullname: W Zhou
– volume: 13
  start-page: 741
  issue: 12
  year: 2006
  ident: 7986_CR38
  publication-title: IEEE signal Processing Letters
  doi: 10.1109/LSP.2006.879829
  contributor:
    fullname: H Yang
– volume: 6
  start-page: 445
  issue: 5
  year: 2012
  ident: 7986_CR22
  publication-title: IET Image Process
  doi: 10.1049/iet-ipr.2011.0574
  contributor:
    fullname: K-C Liu
– volume: 13
  start-page: 600
  issue: 4
  year: 2004
  ident: 7986_CR36
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2003.819861
  contributor:
    fullname: Z Wang
– volume: 18
  start-page: 19
  issue: 1
  year: 2011
  ident: 7986_CR44
  publication-title: IEEE Signal Processing Letters
  doi: 10.1109/LSP.2010.2090041
  contributor:
    fullname: Y Zhao
– volume: 76
  start-page: 2267
  issue: 2
  year: 2017
  ident: 7986_CR27
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-3218-9
  contributor:
    fullname: C Qin
– ident: 7986_CR14
  doi: 10.1109/BICTA.2007.4806454
– volume: 6
  start-page: 1223
  issue: 4
  year: 2011
  ident: 7986_CR40
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2159208
  contributor:
    fullname: X Zhang
– volume: 14
  start-page: 727
  issue: 10
  year: 2007
  ident: 7986_CR41
  publication-title: IEEE Signal Processing Letters
  doi: 10.1109/LSP.2007.896436
  contributor:
    fullname: X Zhang
– volume: 25
  start-page: 1893
  issue: 16
  year: 2004
  ident: 7986_CR34
  publication-title: Pattern Recogn Lett
  doi: 10.1016/j.patrec.2004.08.017
  contributor:
    fullname: S Suthaharan
– volume: 41
  start-page: 654
  issue: 2
  year: 2008
  ident: 7986_CR5
  publication-title: Pattern Recogn
  doi: 10.1016/j.patcog.2007.06.003
  contributor:
    fullname: C-C Chang
– volume: 88
  start-page: 287
  year: 2016
  ident: 7986_CR16
  publication-title: Measurement
  doi: 10.1016/j.measurement.2016.03.053
  contributor:
    fullname: C-S Hsu
– volume: 9
  start-page: 145
  issue: 1
  year: 2018
  ident: 7986_CR24
  publication-title: Int J Mach Learn Cybern
  doi: 10.1007/s13042-015-0329-6
  contributor:
    fullname: R Mehta
– ident: 7986_CR30
  doi: 10.1109/GCCE.2014.7031326
– volume: 195
  start-page: 62
  year: 2012
  ident: 7986_CR7
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2012.01.014
  contributor:
    fullname: F Di Martino
– volume: 76
  start-page: 953
  issue: 1
  year: 2017
  ident: 7986_CR33
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-3010-x
  contributor:
    fullname: D Singh
– volume: 8
  start-page: 619
  issue: 11
  year: 2014
  ident: 7986_CR8
  publication-title: IET Image Process
  doi: 10.1049/iet-ipr.2013.0646
  contributor:
    fullname: M El'arbi
– volume: 10
  start-page: 1593
  issue: 10
  year: 2001
  ident: 7986_CR37
  publication-title: IEEE Trans Image Process
  doi: 10.1109/83.951543
  contributor:
    fullname: PW Wong
– ident: 7986_CR12
– volume: 19
  start-page: 272
  issue: 4–5
  year: 2014
  ident: 7986_CR11
  publication-title: Journal of Information Security and Applications
  doi: 10.1016/j.jisa.2014.07.004
  contributor:
    fullname: S Ghosal
– volume: 22
  start-page: 1134
  issue: 3
  year: 2013
  ident: 7986_CR18
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2012.2227769
  contributor:
    fullname: P Korus
– ident: 7986_CR10
– volume: 7
  start-page: 185
  issue: 1
  year: 2012
  ident: 7986_CR13
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2162950
  contributor:
    fullname: H He
– volume: 10
  start-page: 1490
  issue: 8
  year: 2008
  ident: 7986_CR42
  publication-title: IEEE Transactions on Multimedia
  doi: 10.1109/TMM.2008.2007334
  contributor:
    fullname: X Zhang
– volume: 90
  start-page: 64
  issue: 1
  year: 2002
  ident: 7986_CR6
  publication-title: Proc IEEE
  doi: 10.1109/5.982406
  contributor:
    fullname: C De Vleeschouwer
– volume: 11
  start-page: 585
  issue: 6
  year: 2002
  ident: 7986_CR4
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2002.1014990
  contributor:
    fullname: MU Celik
– volume: 75
  start-page: 8695
  issue: 14
  year: 2016
  ident: 7986_CR1
  publication-title: Multimed Tools Appl
  doi: 10.1007/s11042-015-2786-z
  contributor:
    fullname: O Benrhouma
– volume: 70
  start-page: 1055
  issue: 8
  year: 2016
  ident: 7986_CR25
  publication-title: AEU-International Journal of Electronics and Communications
  doi: 10.1016/j.aeue.2016.05.003
  contributor:
    fullname: T-S Nguyen
– ident: 7986_CR31
  doi: 10.1007/978-3-642-37463-0_10
– volume: 25
  start-page: 18
  issue: 4
  year: 2010
  ident: 7986_CR23
  publication-title: IEEE Aerosp Electron Syst Mag
  doi: 10.1109/MAES.2010.5467652
  contributor:
    fullname: B Mahdian
– ident: 7986_CR20
– volume: 138
  start-page: 280
  year: 2017
  ident: 7986_CR28
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2017.03.033
  contributor:
    fullname: C Qin
– volume: 26
  start-page: 16
  issue: 2
  year: 2009
  ident: 7986_CR9
  publication-title: IEEE Signal Process Mag
  doi: 10.1109/MSP.2008.931079
  contributor:
    fullname: H Farid
– volume: 3
  start-page: 567
  issue: 3
  year: 2008
  ident: 7986_CR15
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2008.926994
  contributor:
    fullname: AT Ho
– volume: 6
  start-page: 10269
  year: 2018
  ident: 7986_CR29
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2799240
  contributor:
    fullname: A Shehab
– volume: 38
  start-page: 775
  year: 2016
  ident: 7986_CR32
  publication-title: J Vis Commun Image Represent
  doi: 10.1016/j.jvcir.2016.04.023
  contributor:
    fullname: D Singh
– volume: 46
  start-page: 52
  year: 2017
  ident: 7986_CR3
  publication-title: Displays
  doi: 10.1016/j.displa.2017.01.001
  contributor:
    fullname: F Cao
– ident: 7986_CR19
  doi: 10.1109/ICIIP.2015.7414830
SSID ssj0016524
Score 2.4123518
Snippet The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 32523
SubjectTerms Algorithms
Cluster analysis
Clustering
Computer Communication Networks
Computer Science
Data recovery
Data Structures and Information Theory
Dependence
Digital signatures
Digital watermarks
Discrete cosine transform
Forgery
Fourier transforms
Image detection
Image manipulation
Localization
Machine learning
Methods
Multimedia
Multimedia Information Systems
Radiation
Special Purpose and Application-Based Systems
Vector quantization
Watermarking
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFA86L3rwYypOp7yDNw226Zq2JxFxDkVPDnYraZoMQbu5dcjAP96XNLUq6LWlOfR9_H55n4ScChHoQKuchkIyiggR0DiRikotNBNMqMiu83l45INh724UjlzAbe7KKmufaB11PpEmRn6BNCFB3Qs4v5y-UbM1ymRX3QqNVbLmsygyl6-4f_uVReChW2obexSR0XdNM1XrnG8aUzzbwpPEnAY_galhm78SpBZ3-ttk0xFGuKokvENWVNEmW_UyBnC22SYb3yYL7pIPJKRjNHh4F9b32og4IEGF51f0IFAKpMszyFVpS7EKEEUOFtdcXyaYAC1U1R7oEMFcnFHrlyARXW1B7RJMzfwY7umrQrwD-bIwQxfw0R4Z9m-ergfULVqgEi2wpBpRXSAz68U5i_Io6yFn5CJA5IoTJbVmkvmZNmDHpfIy9Aox-mtkjkmc8yjXwT5pFZNCHRCQSDhCzxNIG7JeJhIzIE_j15kWivsy6pCz-i-n02qeRtpMTjYySVEmqZVJGnRItxZE6mxrnjaa0CHntXCa13-fdvj_aUdknRl9sI2GXdIqZwt1jIyjzE6sWn0CVt_UbA
  priority: 102
  providerName: ProQuest
Title Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering
URI https://link.springer.com/article/10.1007/s11042-019-07986-3
https://www.proquest.com/docview/2269225366
Volume 78
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH7Y9qIHl6pYreUdvOlAmjTbsUoXLBYRC_UUJpOZItgoNUUK_njfTBOjogdPgSyTkLd838y8BeCMc0c5SibM5cJmhBAOC0IhmVBc2dzm0jftfG7G3nDSuZ660zKP2wS7FzuSxlGXuW5tnUlimZybMPCYU4Gaq8uhkRJP7O7n1oHn5p1sA4sRHLbzTJnfx_iORiXF_LErasCmvwvbOUvE7lqse7Ah0zrsFB0YMDfIOmx9KSe4D-_EQmdk5fjGjcM1y-BIrBQf5-Q2MOPEkReYyMzEX6XI0wQNmOXJmKhXZXEd4kFeEPVsmVR9hYIg1UTRrlAHys9wxOaSQA7F01JXWqBTBzDp9-6vhizvrsAEmV3GFEE5JzrWCRLbT_y4Q0TR4w7BVRBKoZQt7HasNMJ5QloxuYKAnDTRxTBIPD9RziFU0-dUHgEKYhmuZXHiCnEn5qGuiqfo6Vhx6bWF34Dz4i9HL-siGlFZLlnLJCKZREYmkdOAZiGIKDeo14hYYkgvoY9pwEUhnPLy36Md_-_2E9i0tX6YbMMmVLPFUp4S7cjiFlSC_qAFte7gYdSj42VvfHvXMsr3AW3S1QI
link.rule.ids 315,783,787,12777,21400,27936,27937,33385,33756,41093,41535,42162,42604,43612,43817,52123,52246,74363,74630
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JS8NAFH6oPagHd7Fa9R286WCWdpKcREWpWxFR8BYmk5ki2LS2ERH88b6ZTqwKek3IHPKW75u3AuwJEepQq5y1hAwYIUTI4kQqJrXQgQiEiuw6n5sObz80Lx9bjy7gNnJllZVPtI4670sTIz8kmpCQ7oWcHw1emNkaZbKrboXGNNTMqCq6fNVOzjq3d195BN5ya21jjxE2-q5tZtw855vWFM828SQxZ-FPaJrwzV8pUos850uw4CgjHo9lvAxTqliBxWodAzrrXIH5b7MFV-GDKGmXTB7fhPW-NiaORFHxqUc-BEtBhHmIuSptMVaBosjRIpvrzEQTosVxvQe5RDRXZ9L7d5SEr7ak9h1N1XwXr1hPEeKhfH41Yxfo0Ro8nJ_dn7aZW7XAJNlgyTThuiBu1ozzIMqjrEmskYuQsCtOlNQ6kIGfaQN3XCovI78Qk8cm7pjEOY9yHa7DTNEv1AagJMrR8jxBxCFrZiIxI_I0fZ1pobgvozrsV385HYwnaqST2clGJinJJLUyScM6NCpBpM66RulEF-pwUAln8vrv0zb_P20XZtv3N9fp9UXnagvmAqMbtu2wATPl8FVtE_8osx2nZJ8X3Ni9
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8QwEB50BdGDb3F9zsGbBrtNN21P4mvxuYgoeCtpmoig9bFdRPDHO8mmrgp6bWkOmcf3NflmBmBTSm640QVrSxUyQgjOklRppow0oQyljt04n4uuOL6JTm_bt17_1POyyjonukRdPCl7Rr5DNCEl3-NC7Bgvi7g87Ow-vzA7QcretPpxGqMwFkeCBw0Y2z_qXl593SmIth9xmwSMcLLlS2gGhXQtW6YSuIKeNBGM_4SpIff8dV3qUKgzA1OePuLewN6zMKLLOZiuRzOgj9Q5mPzWZ3AePoie3lH445t0mdidjyPRVbx_pHyClSTy_IqFrpwwq0RZFuhQzldpoj2uxYH2g9Ij2t9oioF3VIS1Tl77jlZBf4dn7FET-qF66NsWDPRoAW46R9cHx8yPXWCK4rFihjBeEk-LkiKMiziPiEEKyQnHklQrY0IVtnJjoU8oHeSUIxLK3sQj06QQcWH4IjTKp1IvASqiH-0gkEQi8iiXqW2XZ-jr3EgtWipuwla9y9nzoLtGNuyjbG2SkU0yZ5OMN2G1NkTmI62XDf2iCdu1cYav_15t-f_VNmCc_Cs7P-mercBEaF3DVSCuQqN67es1oiJVvu597BMm2dzr
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fragile+watermarking+for+image+tamper+detection+and+localization+with+effective+recovery+capability+using+K-means+clustering&rft.jtitle=Multimedia+tools+and+applications&rft.au=Abdelhakim%2C+Assem&rft.au=Saleh%2C+Hassan+I.&rft.au=Abdelhakim%2C+Mai&rft.date=2019-11-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=78&rft.issue=22&rft.spage=32523&rft.epage=32563&rft_id=info:doi/10.1007%2Fs11042-019-07986-3&rft.externalDocID=10_1007_s11042_019_07986_3
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon