Description: Since the birth of digital data hiding, image authentication has been one of its most widespread applications. During the first years, aside a few numbers of works, this application was limited to verifying the integrity of the image or locating its tampered regions. Nowadays, these watermarks are designed in sophisticated ways to not only localize the image tampering, but also recover the lost content in those areas. In tampering protection and self-recovery schemes, the goal is to embed a representation of the original image into itself in a way to efficiently compromise between three design parameters the quality of the watermarked image, the quality of the content recovery in tampered areas, and the tolerable tampering rate (TTR).
To Search:
File list (Check if you may need any files):
Filename | Size | Date |
---|
PROJECT_MAIN.fig |
PROJECT_MAIN.m |
psnr.m |
raf | 220x200 | 075 | f | fafafa ca443f4786.u1.jpg |
rec.m |
recover.asv |
recover.m |
recover.rar |
rg.m |
small.bmp |
Steg.m |
stu.m |
switch.asv |
switch.txt |
switch2.m |
texture_feature.m |