Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering
The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery tec...
Saved in:
Published in | Multimedia tools and applications Vol. 78; no. 22; pp. 32523 - 32563 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.11.2019
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the
K
-means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively. |
---|---|
AbstractList | The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K-means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively. The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K -means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively. |
Author | Abdelhakim, Mai Abdelhakim, Assem Saleh, Hassan I. |
Author_xml | – sequence: 1 givenname: Assem orcidid: 0000-0003-0730-2012 surname: Abdelhakim fullname: Abdelhakim, Assem email: assemh81@gmail.com organization: Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT), Egyptian Atomic Energy Authority – sequence: 2 givenname: Hassan I. surname: Saleh fullname: Saleh, Hassan I. organization: Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT), Egyptian Atomic Energy Authority – sequence: 3 givenname: Mai surname: Abdelhakim fullname: Abdelhakim, Mai organization: Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT), Egyptian Atomic Energy Authority, School of Computing and Information, University of Pittsburgh |
BookMark | eNp9kM1OwzAQhC0EEm3hBThZ4mzwT2onR1RRQFTiAmfLcdYlJY2DnbYq4uFxWiRunHa1uzOj_cbotPUtIHTF6A2jVN1GxmjGCWUFoarIJREnaMSmShClODtNvcgpUVPKztE4xhWlTE55NkLf82CWdQN4Z3oIaxM-6naJnQ-4Xpsl4N6sOwi4gh5sX_sWm7bCjbemqb_MYbCr-3cMzg37LeAA1m8h7LE1nSnrpu73eBMH02eyBtNGbJtNTFlpdIHOnGkiXP7WCXqb37_OHsni5eFpdrcgVrCiJy6j0mRMZnnFVaXKrGBSGsHzLC_AOsctZ6UTVEhpgZZUiRyMLVQCUUlVOTFB10ffLvjPDcRer_wmtClScy4LzqdJmq748coGH2MAp7uQIIS9ZlQPlPWRsk6U9YGyFkkkjqLYDR9B-LP-R_UDxAOD4g |
CitedBy_id | crossref_primary_10_3390_met13050881 crossref_primary_10_1016_j_jisa_2023_103425 crossref_primary_10_1109_ACCESS_2020_3022779 crossref_primary_10_1002_cpe_7191 crossref_primary_10_3390_e25030508 crossref_primary_10_1016_j_compeleceng_2023_108783 crossref_primary_10_1016_j_eswa_2023_121903 crossref_primary_10_1007_s11042_023_15806_y crossref_primary_10_1007_s11042_021_11018_4 crossref_primary_10_1016_j_jisa_2023_103619 crossref_primary_10_1016_j_jvcir_2022_103437 crossref_primary_10_1007_s11042_022_13312_1 crossref_primary_10_1109_TCSVT_2020_2969464 crossref_primary_10_1007_s11042_021_11529_0 crossref_primary_10_1016_j_eswa_2023_120228 crossref_primary_10_1016_j_cosrev_2020_100287 crossref_primary_10_1007_s11042_020_10210_2 crossref_primary_10_1007_s11042_022_13630_4 crossref_primary_10_1007_s11042_024_18908_3 crossref_primary_10_1016_j_jksuci_2023_101795 crossref_primary_10_1016_j_micpro_2022_104483 crossref_primary_10_1109_TCSVT_2020_3032455 crossref_primary_10_1109_ACCESS_2020_3047270 |
Cites_doi | 10.1109/MAES.2010.5467652 10.1016/j.patcog.2007.06.003 10.1016/j.dsp.2010.04.006 10.1109/LSP.2006.879829 10.1016/j.sigpro.2017.03.033 10.1016/j.patrec.2004.08.017 10.1109/TIFS.2011.2162950 10.1016/j.jisa.2014.07.004 10.1007/s11042-015-3218-9 10.1109/TIP.2003.819861 10.1109/TIFS.2011.2159208 10.1109/LSP.2007.896436 10.1109/TIP.2010.2066981 10.1109/LSP.2010.2090041 10.1016/j.aeue.2008.05.010 10.1109/TMM.2008.2007334 10.1016/j.aeue.2016.05.003 10.1007/s11760-012-0312-6 10.1109/ACCESS.2018.2799240 10.1007/s11042-015-2786-z 10.1016/j.patcog.2005.02.007 10.1049/iet-ipr.2013.0646 10.1109/TIP.2012.2227769 10.1016/j.sigpro.2009.07.007 10.1109/TIFS.2008.926994 10.1109/TIP.2002.1014990 10.1016/j.jvcir.2016.04.023 10.1109/83.951543 10.1007/s11042-015-3010-x 10.1016/j.aeue.2015.10.006 10.1109/5.982406 10.1049/iet-ipr.2011.0574 10.1016/j.displa.2017.01.001 10.1016/j.measurement.2016.03.053 10.1007/s13042-015-0329-6 10.1109/MSP.2008.931079 10.1016/j.ins.2012.01.014 10.1109/BICTA.2007.4806454 10.1109/GCCE.2014.7031326 10.1007/978-3-642-37463-0_10 10.1109/ICIIP.2015.7414830 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2019 Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved. |
Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019 – notice: Multimedia Tools and Applications is a copyright of Springer, (2019). All Rights Reserved. |
DBID | AAYXX CITATION 3V. 7SC 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ GUQSH HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N M2O MBDVC P5Z P62 PQBIZ PQBZA PQEST PQQKQ PQUKI PRINS Q9U |
DOI | 10.1007/s11042-019-07986-3 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest_ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Database (1962 - current) ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central ProQuest Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student Research Library Prep SciTech Premium Collection (Proquest) (PQ_SDU_P3) ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global (ProQuest) Computing Database ProQuest research library Research Library (Corporate) ProQuest Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest Central Korea ProQuest Research Library Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1573-7721 |
EndPage | 32563 |
ExternalDocumentID | 10_1007_s11042_019_07986_3 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3EH 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 8AO 8FE 8FG 8FL 8G5 8UJ 95- 95. 95~ 96X AAAVM AABHQ AABYN AAFGU AAHNG AAIAL AAJKR AANZL AAOBN AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAWWR AAYFA AAYIU AAYQN AAYTO ABBBX ABBXA ABDZT ABECU ABFGW ABFTV ABHLI ABHQN ABJNI ABJOX ABKAS ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFO ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACREN ACSNA ACTTH ACVWB ACWMK ADGRI ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEEQQ AEFIE AEFTE AEGAL AEGNC AEJHL AEJRE AEKMD AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AEYWE AFEXP AFGCZ AFKRA AFLOW AFNRJ AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGBP AGGDS AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GUQSH GXS HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M2O M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TH9 TSG TSK TSV TUC TUS U2A UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7S Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8P Z8Q Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~EX AACDK AAEOY AAJBT AASML AAYXX ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CITATION H13 PQBZA 7SC 7XB 8AL 8FD 8FK AAYZH JQ2 L.- L7M L~C L~D MBDVC PQEST PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c319t-f406a41648d27d7b49166a328489ecff2c21bf30366ce0b0738eac97798d67df3 |
IEDL.DBID | U2A |
ISSN | 1380-7501 |
IngestDate | Mon Nov 04 11:04:56 EST 2024 Thu Sep 12 19:19:20 EDT 2024 Sat Dec 16 12:03:51 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 22 |
Keywords | Unsupervised machine learning Tampering localization Discrete Cosine Transform Fragile watermarking K-means clustering Image authentication |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-f406a41648d27d7b49166a328489ecff2c21bf30366ce0b0738eac97798d67df3 |
ORCID | 0000-0003-0730-2012 |
PQID | 2269225366 |
PQPubID | 54626 |
PageCount | 41 |
ParticipantIDs | proquest_journals_2269225366 crossref_primary_10_1007_s11042_019_07986_3 springer_journals_10_1007_s11042_019_07986_3 |
PublicationCentury | 2000 |
PublicationDate | 2019-11-01 |
PublicationDateYYYYMMDD | 2019-11-01 |
PublicationDate_xml | – month: 11 year: 2019 text: 2019-11-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | An International Journal |
PublicationTitle | Multimedia tools and applications |
PublicationTitleAbbrev | Multimed Tools Appl |
PublicationYear | 2019 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | De Vleeschouwer, Delaigle, Macq (CR6) 2002; 90 Zhang, Qian, Ren, Feng (CR40) 2011; 6 CR19 Bohra, Farooq (CR2) 2009; 63 Yang, Kot (CR38) 2006; 13 Farid (CR9) 2009; 26 CR17 CR14 Qin, Ji, Zhang, Dong, Wang (CR28) 2017; 138 Korus, Dziech (CR18) 2013; 22 CR12 CR10 CR31 Lin, Hsieh, Huang (CR21) 2005; 38 CR30 Suthaharan (CR34) 2004; 25 Zhao, Chen, Zhu, Tan, Yu (CR44) 2011; 18 Zhang, Wang (CR41) 2007; 14 Zhang, Wang, Qian, Feng (CR43) 2011; 20 Zhang, Wang (CR42) 2008; 10 Mahdian, Saic (CR23) 2010; 25 Qian, Feng, Zhang, Wang (CR26) 2011; 21 Yang, Shen (CR39) 2010; 90 Cao, An, Wang, Ye, Wang (CR3) 2017; 46 Hsu, Tu (CR16) 2016; 88 Ho, Zhu, Shen, Marziliano (CR15) 2008; 3 Di Martino, Sessa (CR7) 2012; 195 Qin, Ji, Wang, Chang (CR27) 2017; 76 Benrhouma, Hermassi, El-Latif, Belghith (CR1) 2016; 75 He, Chen, Tai, Kalker, Zhang (CR13) 2012; 7 Singh, Singh (CR33) 2017; 76 Zhou, Yu, Wang, Wu, Luo, Sun (CR45) 2016; 70 Wong, Memon (CR37) 2001; 10 Chang, Fan, Tai (CR5) 2008; 41 CR20 Shehab, Elhoseny, Muhammad, Sangaiah, Yang, Huang, Hou (CR29) 2018; 6 Celik, Sharma, Saber, Tekalp (CR4) 2002; 11 Walia, Suneja (CR35) 2014; 8 Liu (CR22) 2012; 6 Mehta, Rajpal, Vishwakarma (CR24) 2018; 9 El'arbi, Amar (CR8) 2014; 8 Ghosal, Mandal (CR11) 2014; 19 Singh, Singh (CR32) 2016; 38 Nguyen, Chang, Yang (CR25) 2016; 70 Wang, Bovik, Sheikh, Simoncelli (CR36) 2004; 13 Y Zhao (7986_CR44) 2011; 18 X Zhang (7986_CR43) 2011; 20 M El'arbi (7986_CR8) 2014; 8 C-C Chang (7986_CR5) 2008; 41 H Farid (7986_CR9) 2009; 26 H Yang (7986_CR38) 2006; 13 X Zhang (7986_CR42) 2008; 10 A Shehab (7986_CR29) 2018; 6 S Suthaharan (7986_CR34) 2004; 25 B Mahdian (7986_CR23) 2010; 25 K-C Liu (7986_CR22) 2012; 6 C Qin (7986_CR27) 2017; 76 MU Celik (7986_CR4) 2002; 11 A Bohra (7986_CR2) 2009; 63 X Zhang (7986_CR41) 2007; 14 PW Wong (7986_CR37) 2001; 10 C-W Yang (7986_CR39) 2010; 90 S Ghosal (7986_CR11) 2014; 19 C Qin (7986_CR28) 2017; 138 C-S Hsu (7986_CR16) 2016; 88 T-S Nguyen (7986_CR25) 2016; 70 Z Qian (7986_CR26) 2011; 21 PL Lin (7986_CR21) 2005; 38 Z Wang (7986_CR36) 2004; 13 7986_CR20 7986_CR14 C De Vleeschouwer (7986_CR6) 2002; 90 7986_CR19 W Zhou (7986_CR45) 2016; 70 7986_CR17 AT Ho (7986_CR15) 2008; 3 O Benrhouma (7986_CR1) 2016; 75 E Walia (7986_CR35) 2014; 8 P Korus (7986_CR18) 2013; 22 D Singh (7986_CR33) 2017; 76 H He (7986_CR13) 2012; 7 R Mehta (7986_CR24) 2018; 9 7986_CR30 F Di Martino (7986_CR7) 2012; 195 D Singh (7986_CR32) 2016; 38 X Zhang (7986_CR40) 2011; 6 7986_CR12 F Cao (7986_CR3) 2017; 46 7986_CR10 7986_CR31 |
References_xml | – volume: 25 start-page: 18 issue: 4 year: 2010 end-page: 24 ident: CR23 article-title: Blind methods for detecting image fakery publication-title: IEEE Aerosp Electron Syst Mag doi: 10.1109/MAES.2010.5467652 contributor: fullname: Saic – volume: 41 start-page: 654 issue: 2 year: 2008 end-page: 661 ident: CR5 article-title: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery publication-title: Pattern Recogn doi: 10.1016/j.patcog.2007.06.003 contributor: fullname: Tai – volume: 21 start-page: 278 issue: 2 year: 2011 end-page: 286 ident: CR26 article-title: Image self-embedding with high-quality restoration capability publication-title: Digital Signal Processing doi: 10.1016/j.dsp.2010.04.006 contributor: fullname: Wang – volume: 13 start-page: 741 issue: 12 year: 2006 end-page: 744 ident: CR38 article-title: Binary image authentication with tampering localization by embedding cryptographic signature and block identifier publication-title: IEEE signal Processing Letters doi: 10.1109/LSP.2006.879829 contributor: fullname: Kot – volume: 138 start-page: 280 year: 2017 end-page: 293 ident: CR28 article-title: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy publication-title: Signal Process doi: 10.1016/j.sigpro.2017.03.033 contributor: fullname: Wang – volume: 25 start-page: 1893 issue: 16 year: 2004 end-page: 1903 ident: CR34 article-title: Fragile image watermarking using a gradient image for improved localization and security publication-title: Pattern Recogn Lett doi: 10.1016/j.patrec.2004.08.017 contributor: fullname: Suthaharan – ident: CR14 – volume: 7 start-page: 185 issue: 1 year: 2012 end-page: 196 ident: CR13 article-title: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2162950 contributor: fullname: Zhang – volume: 19 start-page: 272 issue: 4–5 year: 2014 end-page: 281 ident: CR11 article-title: Binomial transform based fragile watermarking for image authentication publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2014.07.004 contributor: fullname: Mandal – ident: CR12 – ident: CR30 – ident: CR10 – volume: 76 start-page: 2267 issue: 2 year: 2017 end-page: 2287 ident: CR27 article-title: Fragile image watermarking scheme based on VQ index sharing and self-embedding publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-3218-9 contributor: fullname: Chang – volume: 13 start-page: 600 issue: 4 year: 2004 end-page: 612 ident: CR36 article-title: Image quality assessment: from error visibility to structural similarity publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2003.819861 contributor: fullname: Simoncelli – volume: 6 start-page: 1223 issue: 4 year: 2011 end-page: 1232 ident: CR40 article-title: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2159208 contributor: fullname: Feng – volume: 14 start-page: 727 issue: 10 year: 2007 end-page: 730 ident: CR41 article-title: Statistical fragile watermarking capable of locating individual tampered pixels publication-title: IEEE Signal Processing Letters doi: 10.1109/LSP.2007.896436 contributor: fullname: Wang – volume: 20 start-page: 485 issue: 2 year: 2011 end-page: 495 ident: CR43 article-title: Reference sharing mechanism for watermark self-embedding publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2010.2066981 contributor: fullname: Feng – volume: 18 start-page: 19 issue: 1 year: 2011 end-page: 22 ident: CR44 article-title: Binocular just-noticeable-difference model for stereoscopic images publication-title: IEEE Signal Processing Letters doi: 10.1109/LSP.2010.2090041 contributor: fullname: Yu – volume: 63 start-page: 703 issue: 8 year: 2009 end-page: 707 ident: CR2 article-title: Blind self-authentication of images for robust watermarking using integer wavelet transform publication-title: AEU-International Journal of Electronics and Communications doi: 10.1016/j.aeue.2008.05.010 contributor: fullname: Farooq – volume: 10 start-page: 1490 issue: 8 year: 2008 end-page: 1499 ident: CR42 article-title: Fragile watermarking with error-free restoration capability publication-title: IEEE Transactions on Multimedia doi: 10.1109/TMM.2008.2007334 contributor: fullname: Wang – volume: 70 start-page: 1055 issue: 8 year: 2016 end-page: 1061 ident: CR25 article-title: A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain publication-title: AEU-International Journal of Electronics and Communications doi: 10.1016/j.aeue.2016.05.003 contributor: fullname: Yang – volume: 8 start-page: 859 issue: 5 year: 2014 end-page: 872 ident: CR35 article-title: A robust watermark authentication technique based on Weber’s descriptor publication-title: SIViP doi: 10.1007/s11760-012-0312-6 contributor: fullname: Suneja – ident: CR19 – volume: 6 start-page: 10269 year: 2018 end-page: 10278 ident: CR29 article-title: Secure and robust fragile watermarking scheme for medical images publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2799240 contributor: fullname: Hou – volume: 75 start-page: 8695 issue: 14 year: 2016 end-page: 8718 ident: CR1 article-title: Chaotic watermark for blind forgery detection in images publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2786-z contributor: fullname: Belghith – volume: 38 start-page: 2519 issue: 12 year: 2005 end-page: 2529 ident: CR21 article-title: A hierarchical digital watermarking method for image tamper detection and recovery publication-title: Pattern Recogn doi: 10.1016/j.patcog.2005.02.007 contributor: fullname: Huang – volume: 8 start-page: 619 issue: 11 year: 2014 end-page: 626 ident: CR8 article-title: Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain publication-title: IET Image Process doi: 10.1049/iet-ipr.2013.0646 contributor: fullname: Amar – volume: 22 start-page: 1134 issue: 3 year: 2013 end-page: 1147 ident: CR18 article-title: Efficient method for content reconstruction with self-embedding publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2012.2227769 contributor: fullname: Dziech – volume: 90 start-page: 331 issue: 1 year: 2010 end-page: 343 ident: CR39 article-title: Recover the tampered image based on VQ indexing publication-title: Signal Process doi: 10.1016/j.sigpro.2009.07.007 contributor: fullname: Shen – volume: 3 start-page: 567 issue: 3 year: 2008 end-page: 569 ident: CR15 article-title: Fragile Watermarking Based on Encoding of the Zeroes of the $ z $-Transform publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2008.926994 contributor: fullname: Marziliano – ident: CR17 – ident: CR31 – volume: 11 start-page: 585 issue: 6 year: 2002 end-page: 595 ident: CR4 article-title: Hierarchical watermarking for secure image authentication with localization publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2002.1014990 contributor: fullname: Tekalp – volume: 38 start-page: 775 year: 2016 end-page: 789 ident: CR32 article-title: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.04.023 contributor: fullname: Singh – volume: 10 start-page: 1593 issue: 10 year: 2001 end-page: 1601 ident: CR37 article-title: Secret and public key image watermarking schemes for image authentication and ownership verification publication-title: IEEE Trans Image Process doi: 10.1109/83.951543 contributor: fullname: Memon – volume: 76 start-page: 953 issue: 1 year: 2017 end-page: 977 ident: CR33 article-title: DCT based efficient fragile watermarking scheme for image authentication and restoration publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-3010-x contributor: fullname: Singh – volume: 70 start-page: 77 issue: 1 year: 2016 end-page: 84 ident: CR45 article-title: Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images publication-title: AEU-International Journal of Electronics and Communications doi: 10.1016/j.aeue.2015.10.006 contributor: fullname: Sun – volume: 90 start-page: 64 issue: 1 year: 2002 end-page: 77 ident: CR6 article-title: Invisibility and application functionalities in perceptual watermarking an overview publication-title: Proc IEEE doi: 10.1109/5.982406 contributor: fullname: Macq – volume: 6 start-page: 445 issue: 5 year: 2012 end-page: 454 ident: CR22 article-title: Colour image watermarking for tamper proofing and pattern-based recovery publication-title: IET Image Process doi: 10.1049/iet-ipr.2011.0574 contributor: fullname: Liu – volume: 46 start-page: 52 year: 2017 end-page: 60 ident: CR3 article-title: Hierarchical recovery for tampered images based on watermark self-embedding publication-title: Displays doi: 10.1016/j.displa.2017.01.001 contributor: fullname: Wang – volume: 88 start-page: 287 year: 2016 end-page: 296 ident: CR16 article-title: Image tamper detection and recovery using adaptive embedding rules publication-title: Measurement doi: 10.1016/j.measurement.2016.03.053 contributor: fullname: Tu – volume: 9 start-page: 145 issue: 1 year: 2018 end-page: 161 ident: CR24 article-title: Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-015-0329-6 contributor: fullname: Vishwakarma – volume: 26 start-page: 16 issue: 2 year: 2009 end-page: 25 ident: CR9 article-title: Image forgery detection publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2008.931079 contributor: fullname: Farid – ident: CR20 – volume: 195 start-page: 62 year: 2012 end-page: 90 ident: CR7 article-title: Fragile watermarking tamper detection with images compressed by fuzzy transform publication-title: Inf Sci doi: 10.1016/j.ins.2012.01.014 contributor: fullname: Sessa – volume: 90 start-page: 331 issue: 1 year: 2010 ident: 7986_CR39 publication-title: Signal Process doi: 10.1016/j.sigpro.2009.07.007 contributor: fullname: C-W Yang – volume: 63 start-page: 703 issue: 8 year: 2009 ident: 7986_CR2 publication-title: AEU-International Journal of Electronics and Communications doi: 10.1016/j.aeue.2008.05.010 contributor: fullname: A Bohra – volume: 21 start-page: 278 issue: 2 year: 2011 ident: 7986_CR26 publication-title: Digital Signal Processing doi: 10.1016/j.dsp.2010.04.006 contributor: fullname: Z Qian – ident: 7986_CR17 – volume: 38 start-page: 2519 issue: 12 year: 2005 ident: 7986_CR21 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2005.02.007 contributor: fullname: PL Lin – volume: 8 start-page: 859 issue: 5 year: 2014 ident: 7986_CR35 publication-title: SIViP doi: 10.1007/s11760-012-0312-6 contributor: fullname: E Walia – volume: 20 start-page: 485 issue: 2 year: 2011 ident: 7986_CR43 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2010.2066981 contributor: fullname: X Zhang – volume: 70 start-page: 77 issue: 1 year: 2016 ident: 7986_CR45 publication-title: AEU-International Journal of Electronics and Communications doi: 10.1016/j.aeue.2015.10.006 contributor: fullname: W Zhou – volume: 13 start-page: 741 issue: 12 year: 2006 ident: 7986_CR38 publication-title: IEEE signal Processing Letters doi: 10.1109/LSP.2006.879829 contributor: fullname: H Yang – volume: 6 start-page: 445 issue: 5 year: 2012 ident: 7986_CR22 publication-title: IET Image Process doi: 10.1049/iet-ipr.2011.0574 contributor: fullname: K-C Liu – volume: 13 start-page: 600 issue: 4 year: 2004 ident: 7986_CR36 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2003.819861 contributor: fullname: Z Wang – volume: 18 start-page: 19 issue: 1 year: 2011 ident: 7986_CR44 publication-title: IEEE Signal Processing Letters doi: 10.1109/LSP.2010.2090041 contributor: fullname: Y Zhao – volume: 76 start-page: 2267 issue: 2 year: 2017 ident: 7986_CR27 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-3218-9 contributor: fullname: C Qin – ident: 7986_CR14 doi: 10.1109/BICTA.2007.4806454 – volume: 6 start-page: 1223 issue: 4 year: 2011 ident: 7986_CR40 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2159208 contributor: fullname: X Zhang – volume: 14 start-page: 727 issue: 10 year: 2007 ident: 7986_CR41 publication-title: IEEE Signal Processing Letters doi: 10.1109/LSP.2007.896436 contributor: fullname: X Zhang – volume: 25 start-page: 1893 issue: 16 year: 2004 ident: 7986_CR34 publication-title: Pattern Recogn Lett doi: 10.1016/j.patrec.2004.08.017 contributor: fullname: S Suthaharan – volume: 41 start-page: 654 issue: 2 year: 2008 ident: 7986_CR5 publication-title: Pattern Recogn doi: 10.1016/j.patcog.2007.06.003 contributor: fullname: C-C Chang – volume: 88 start-page: 287 year: 2016 ident: 7986_CR16 publication-title: Measurement doi: 10.1016/j.measurement.2016.03.053 contributor: fullname: C-S Hsu – volume: 9 start-page: 145 issue: 1 year: 2018 ident: 7986_CR24 publication-title: Int J Mach Learn Cybern doi: 10.1007/s13042-015-0329-6 contributor: fullname: R Mehta – ident: 7986_CR30 doi: 10.1109/GCCE.2014.7031326 – volume: 195 start-page: 62 year: 2012 ident: 7986_CR7 publication-title: Inf Sci doi: 10.1016/j.ins.2012.01.014 contributor: fullname: F Di Martino – volume: 76 start-page: 953 issue: 1 year: 2017 ident: 7986_CR33 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-3010-x contributor: fullname: D Singh – volume: 8 start-page: 619 issue: 11 year: 2014 ident: 7986_CR8 publication-title: IET Image Process doi: 10.1049/iet-ipr.2013.0646 contributor: fullname: M El'arbi – volume: 10 start-page: 1593 issue: 10 year: 2001 ident: 7986_CR37 publication-title: IEEE Trans Image Process doi: 10.1109/83.951543 contributor: fullname: PW Wong – ident: 7986_CR12 – volume: 19 start-page: 272 issue: 4–5 year: 2014 ident: 7986_CR11 publication-title: Journal of Information Security and Applications doi: 10.1016/j.jisa.2014.07.004 contributor: fullname: S Ghosal – volume: 22 start-page: 1134 issue: 3 year: 2013 ident: 7986_CR18 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2012.2227769 contributor: fullname: P Korus – ident: 7986_CR10 – volume: 7 start-page: 185 issue: 1 year: 2012 ident: 7986_CR13 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2162950 contributor: fullname: H He – volume: 10 start-page: 1490 issue: 8 year: 2008 ident: 7986_CR42 publication-title: IEEE Transactions on Multimedia doi: 10.1109/TMM.2008.2007334 contributor: fullname: X Zhang – volume: 90 start-page: 64 issue: 1 year: 2002 ident: 7986_CR6 publication-title: Proc IEEE doi: 10.1109/5.982406 contributor: fullname: C De Vleeschouwer – volume: 11 start-page: 585 issue: 6 year: 2002 ident: 7986_CR4 publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2002.1014990 contributor: fullname: MU Celik – volume: 75 start-page: 8695 issue: 14 year: 2016 ident: 7986_CR1 publication-title: Multimed Tools Appl doi: 10.1007/s11042-015-2786-z contributor: fullname: O Benrhouma – volume: 70 start-page: 1055 issue: 8 year: 2016 ident: 7986_CR25 publication-title: AEU-International Journal of Electronics and Communications doi: 10.1016/j.aeue.2016.05.003 contributor: fullname: T-S Nguyen – ident: 7986_CR31 doi: 10.1007/978-3-642-37463-0_10 – volume: 25 start-page: 18 issue: 4 year: 2010 ident: 7986_CR23 publication-title: IEEE Aerosp Electron Syst Mag doi: 10.1109/MAES.2010.5467652 contributor: fullname: B Mahdian – ident: 7986_CR20 – volume: 138 start-page: 280 year: 2017 ident: 7986_CR28 publication-title: Signal Process doi: 10.1016/j.sigpro.2017.03.033 contributor: fullname: C Qin – volume: 26 start-page: 16 issue: 2 year: 2009 ident: 7986_CR9 publication-title: IEEE Signal Process Mag doi: 10.1109/MSP.2008.931079 contributor: fullname: H Farid – volume: 3 start-page: 567 issue: 3 year: 2008 ident: 7986_CR15 publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2008.926994 contributor: fullname: AT Ho – volume: 6 start-page: 10269 year: 2018 ident: 7986_CR29 publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2799240 contributor: fullname: A Shehab – volume: 38 start-page: 775 year: 2016 ident: 7986_CR32 publication-title: J Vis Commun Image Represent doi: 10.1016/j.jvcir.2016.04.023 contributor: fullname: D Singh – volume: 46 start-page: 52 year: 2017 ident: 7986_CR3 publication-title: Displays doi: 10.1016/j.displa.2017.01.001 contributor: fullname: F Cao – ident: 7986_CR19 doi: 10.1109/ICIIP.2015.7414830 |
SSID | ssj0016524 |
Score | 2.4123518 |
Snippet | The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 32523 |
SubjectTerms | Algorithms Cluster analysis Clustering Computer Communication Networks Computer Science Data recovery Data Structures and Information Theory Dependence Digital signatures Digital watermarks Discrete cosine transform Forgery Fourier transforms Image detection Image manipulation Localization Machine learning Methods Multimedia Multimedia Information Systems Radiation Special Purpose and Application-Based Systems Vector quantization Watermarking |
SummonAdditionalLinks | – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3NS8MwFA86L3rwYypOp7yDNw226Zq2JxFxDkVPDnYraZoMQbu5dcjAP96XNLUq6LWlOfR9_H55n4ScChHoQKuchkIyiggR0DiRikotNBNMqMiu83l45INh724UjlzAbe7KKmufaB11PpEmRn6BNCFB3Qs4v5y-UbM1ymRX3QqNVbLmsygyl6-4f_uVReChW2obexSR0XdNM1XrnG8aUzzbwpPEnAY_galhm78SpBZ3-ttk0xFGuKokvENWVNEmW_UyBnC22SYb3yYL7pIPJKRjNHh4F9b32og4IEGF51f0IFAKpMszyFVpS7EKEEUOFtdcXyaYAC1U1R7oEMFcnFHrlyARXW1B7RJMzfwY7umrQrwD-bIwQxfw0R4Z9m-ergfULVqgEi2wpBpRXSAz68U5i_Io6yFn5CJA5IoTJbVmkvmZNmDHpfIy9Aox-mtkjkmc8yjXwT5pFZNCHRCQSDhCzxNIG7JeJhIzIE_j15kWivsy6pCz-i-n02qeRtpMTjYySVEmqZVJGnRItxZE6mxrnjaa0CHntXCa13-fdvj_aUdknRl9sI2GXdIqZwt1jIyjzE6sWn0CVt_UbA priority: 102 providerName: ProQuest |
Title | Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering |
URI | https://link.springer.com/article/10.1007/s11042-019-07986-3 https://www.proquest.com/docview/2269225366 |
Volume | 78 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1JS8NAFH7Y9qIHl6pYreUdvOlAmjTbsUoXLBYRC_UUJpOZItgoNUUK_njfTBOjogdPgSyTkLd838y8BeCMc0c5SibM5cJmhBAOC0IhmVBc2dzm0jftfG7G3nDSuZ660zKP2wS7FzuSxlGXuW5tnUlimZybMPCYU4Gaq8uhkRJP7O7n1oHn5p1sA4sRHLbzTJnfx_iORiXF_LErasCmvwvbOUvE7lqse7Ah0zrsFB0YMDfIOmx9KSe4D-_EQmdk5fjGjcM1y-BIrBQf5-Q2MOPEkReYyMzEX6XI0wQNmOXJmKhXZXEd4kFeEPVsmVR9hYIg1UTRrlAHys9wxOaSQA7F01JXWqBTBzDp9-6vhizvrsAEmV3GFEE5JzrWCRLbT_y4Q0TR4w7BVRBKoZQt7HasNMJ5QloxuYKAnDTRxTBIPD9RziFU0-dUHgEKYhmuZXHiCnEn5qGuiqfo6Vhx6bWF34Dz4i9HL-siGlFZLlnLJCKZREYmkdOAZiGIKDeo14hYYkgvoY9pwEUhnPLy36Md_-_2E9i0tX6YbMMmVLPFUp4S7cjiFlSC_qAFte7gYdSj42VvfHvXMsr3AW3S1QI |
link.rule.ids | 315,783,787,12777,21400,27936,27937,33385,33756,41093,41535,42162,42604,43612,43817,52123,52246,74363,74630 |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JS8NAFH6oPagHd7Fa9R286WCWdpKcREWpWxFR8BYmk5ki2LS2ERH88b6ZTqwKek3IHPKW75u3AuwJEepQq5y1hAwYIUTI4kQqJrXQgQiEiuw6n5sObz80Lx9bjy7gNnJllZVPtI4670sTIz8kmpCQ7oWcHw1emNkaZbKrboXGNNTMqCq6fNVOzjq3d195BN5ya21jjxE2-q5tZtw855vWFM828SQxZ-FPaJrwzV8pUos850uw4CgjHo9lvAxTqliBxWodAzrrXIH5b7MFV-GDKGmXTB7fhPW-NiaORFHxqUc-BEtBhHmIuSptMVaBosjRIpvrzEQTosVxvQe5RDRXZ9L7d5SEr7ak9h1N1XwXr1hPEeKhfH41Yxfo0Ro8nJ_dn7aZW7XAJNlgyTThuiBu1ozzIMqjrEmskYuQsCtOlNQ6kIGfaQN3XCovI78Qk8cm7pjEOY9yHa7DTNEv1AagJMrR8jxBxCFrZiIxI_I0fZ1pobgvozrsV385HYwnaqST2clGJinJJLUyScM6NCpBpM66RulEF-pwUAln8vrv0zb_P20XZtv3N9fp9UXnagvmAqMbtu2wATPl8FVtE_8osx2nZJ8X3Ni9 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8QwEB50BdGDb3F9zsGbBrtNN21P4mvxuYgoeCtpmoig9bFdRPDHO8mmrgp6bWkOmcf3NflmBmBTSm640QVrSxUyQgjOklRppow0oQyljt04n4uuOL6JTm_bt17_1POyyjonukRdPCl7Rr5DNCEl3-NC7Bgvi7g87Ow-vzA7QcretPpxGqMwFkeCBw0Y2z_qXl593SmIth9xmwSMcLLlS2gGhXQtW6YSuIKeNBGM_4SpIff8dV3qUKgzA1OePuLewN6zMKLLOZiuRzOgj9Q5mPzWZ3AePoie3lH445t0mdidjyPRVbx_pHyClSTy_IqFrpwwq0RZFuhQzldpoj2uxYH2g9Ij2t9oioF3VIS1Tl77jlZBf4dn7FET-qF66NsWDPRoAW46R9cHx8yPXWCK4rFihjBeEk-LkiKMiziPiEEKyQnHklQrY0IVtnJjoU8oHeSUIxLK3sQj06QQcWH4IjTKp1IvASqiH-0gkEQi8iiXqW2XZ-jr3EgtWipuwla9y9nzoLtGNuyjbG2SkU0yZ5OMN2G1NkTmI62XDf2iCdu1cYav_15t-f_VNmCc_Cs7P-mercBEaF3DVSCuQqN67es1oiJVvu597BMm2dzr |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fragile+watermarking+for+image+tamper+detection+and+localization+with+effective+recovery+capability+using+K-means+clustering&rft.jtitle=Multimedia+tools+and+applications&rft.au=Abdelhakim%2C+Assem&rft.au=Saleh%2C+Hassan+I.&rft.au=Abdelhakim%2C+Mai&rft.date=2019-11-01&rft.pub=Springer+US&rft.issn=1380-7501&rft.eissn=1573-7721&rft.volume=78&rft.issue=22&rft.spage=32523&rft.epage=32563&rft_id=info:doi/10.1007%2Fs11042-019-07986-3&rft.externalDocID=10_1007_s11042_019_07986_3 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1380-7501&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1380-7501&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1380-7501&client=summon |