{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:48:39Z","timestamp":1770277719371,"version":"3.49.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T00:00:00Z","timestamp":1542153600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2019,3,16]]},"abstract":"<jats:p>Traditional digital image authentication is usually based on signature or fragile watermarks. This performs authentication without any secret hidden data. Until now, many image authentication schemes with error detection based on watermarks or signatures have been proposed. Tampering attack can be detected but the areas tampered with cannot be determined for these schemes. In order to improve this shortcoming, a verifiable data hiding scheme is proposed for digital images in this paper. The main idea of the proposed scheme is combining multi-bit encoding function and multi-group data hiding scheme to increase embedding capacity and strengthen security with parity check to verify the tampering of digital images having embedded secret messages. Therefore, there are three major contributions in our proposed scheme. First, it can achieve image tamper detection and find what has been modified. Second, it resists collage attack. Third, it can increase the embedding capacity. These contributions are discussed according to experimental results. The proposed scheme includes a high security to reduce detection of hidden data and the MSE analysis also proves this scheme has good image quality.<\/jats:p>","DOI":"10.3233\/jifs-169902","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T12:44:35Z","timestamp":1542372275000},"page":"1311-1321","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable data hiding scheme with tamper detection"],"prefix":"10.1177","volume":"36","author":[{"given":"Wen-Chung","family":"Kuo","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Yunlin University of Science &amp; Technology, Yunlin, Taiwan, R.O.C."}]},{"given":"Chun-Cheng","family":"Wang","sequence":"additional","affiliation":[{"name":"National Center for High-performance Computing, National Applied Research Laboratories, Tainan, Taiwan, R.O.C."}]},{"given":"Shao-Hung","family":"Kuo","sequence":"additional","affiliation":[{"name":"Institute for Information Industry, Taipei, Taiwan, R.O.C."}]},{"given":"Lih-Chyau","family":"Wuu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Yunlin University of Science &amp; Technology, Yunlin, Taiwan, R.O.C."}]}],"member":"179","published-online":{"date-parts":[[2018,11,14]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2012.12.005"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2128309"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2159984"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2012.11.004"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2157515"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2011.01.016"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.11.028"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2207729"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.811621"},{"issue":"1","key":"e_1_3_2_12_2","first-page":"1","article-title":"Design of a robust and secure digital signature scheme for image authentication over wireless channels","volume":"3","author":"Saad S.M.","year":"2009","unstructured":"S.M.Saad, Design of a robust and secure digital signature scheme for image authentication over wireless channels, IETInformation Security 3(1) (2009), 1-8.","journal-title":"IETInformation Security"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.879829"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.006"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3574-0"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.01.058"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.07.013"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.003"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.02.007"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2010.12.005"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3010-x"},{"key":"e_1_3_2_22_2","first-page":"1","article-title":"Prasad, Fragile watermarking schemes for image authentication: A survey","author":"Sreenivas K.","year":"2017","unstructured":"K.Sreenivas and V.Kamkshi, Prasad, Fragile watermarking schemes for image authentication: A survey, International Journal of Machine Learning and Cybernetics (2017), 1-26.","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2012.0109"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.04.004"},{"key":"e_1_3_2_25_2","author":"Cox I.J.","year":"2008","unstructured":"I.J.Cox, M.L.Miller, J.A.Bloom, J.Fridrich and T.Kalker, Digital Watermarking and Steganography (Second Edition) (2008).","journal-title":"Digital Watermarking and Steganography"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2012.07.010"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2012.12.001"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2011.03.011"},{"key":"e_1_3_2_29_2","first-page":"286","article-title":"The High Embedding Steganographic Method Based on General Multi-EMD","author":"Kuo W.C.","year":"2012","unstructured":"W.C.Kuo, L.C.Wuu and S.H.Kuo, The High Embedding Steganographic Method Based on General Multi-EMD, The 2012 International Conference on Information Security and Intelligent Control (ISIC'12), 2012, pp. 286-289.","journal-title":"The 2012 International Conference on Information Security and Intelligent Control (ISIC'12)"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"},{"key":"e_1_3_2_31_2","article-title":"Comparison of high capacity improvements with secure GEMD, master thesis, department of computer science and information engineering","author":"Chang S.Y.","year":"2014","unstructured":"S.Y.Chang, Comparison of high capacity improvements with secure GEMD, master thesis, department of computer science and information engineering, National Yunlin University of Science & Technology (2014).","journal-title":"National Yunlin University of Science & Technology"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/658047"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1179\/1743131X12Y.0000000011"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.3233\/JIFS-169902","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169902","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169902","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:28:32Z","timestamp":1770229712000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169902"}},"subtitle":[],"editor":[{"given":"Wen-Hsiang","family":"Hsieh","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,11,14]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,16]]}},"alternative-id":["10.3233\/JIFS-169902"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169902","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,14]]}}}