{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T16:30:54Z","timestamp":1769704254474,"version":"3.49.0"},"reference-count":16,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,3,9]]},"abstract":"<jats:p>This paper presents a secure image authentication scheme for tamper localization and recovery at pixel level. The proposed scheme encrypts the watermark comprising tamper localization code and self-recovery code using chaotic sequence to ensure security. This scheme uses pixel to block conversion technique for ensuring lossless recovery of the original image from an untampered watermarked image. For enhancing the localization accuracy, a multilevel tamper localization strategy is used. The experimental results show that the proposed scheme generates watermarked images with minimal information loss and can withstand copy-move, image splicing, content removal, vector quantization, collage and content only attacks. This scheme has better security, better tamper localization accuracy and better recovered image quality under extensive tampering and takes less computation time in comparison to the state-of-the-art schemes.<\/jats:p>","DOI":"10.3233\/jifs-221245","type":"journal-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T10:07:39Z","timestamp":1670580459000},"page":"4481-4493","source":"Crossref","is-referenced-by-count":0,"title":["A secure pixel level self-recovery scheme for digital images"],"prefix":"10.1177","volume":"44","author":[{"given":"N.R.","family":"Neena Raj","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, College of Engineering Trivandrum, (Affiliated to APJ Abdul Kalam Technological University), Thiruvananthapuram, Kerala, India"}]},{"given":"R.","family":"Shreelekshmi","sequence":"additional","affiliation":[{"name":"Department of Computer Applications, College of Engineering Trivandrum, (Affiliated to APJ Abdul Kalam Technological University), Thiruvananthapuram, Kerala, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-221245_ref1","doi-asserted-by":"crossref","first-page":"19307","DOI":"10.1007\/s11042-021-10664-y","article-title":"A survey on fragile watermarking based image authentication schemes","volume":"80","author":"Neena Raj","year":"2021","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"10.3233\/JIFS-221245_ref3","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1007\/s12652-018-1158-8","article-title":"An efficient watermarking technique for tamper detection and localization of medical images","volume":"11","author":"Gull","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10.3233\/JIFS-221245_ref6","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","article-title":"Hiding clinical information in medical images: A new high capacity and reversible data hiding technique","volume":"66","author":"Parah","year":"2017","journal-title":"Journal of Biomedical Informatics"},{"issue":"19","key":"10.3233\/JIFS-221245_ref7","doi-asserted-by":"crossref","first-page":"12869","DOI":"10.1007\/s11042-019-08484-2","article-title":"Embedding electronic patient information in clinical images: An improved and efficient reversible data hiding technique","volume":"79","author":"Geetha","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"10.3233\/JIFS-221245_ref8","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1007\/s11042-015-3010-x","article-title":"Dct based efficient fragile watermarking scheme for image authentication and restoration","volume":"76","author":"Singh","year":"2017","journal-title":"Multimedia Tools and Applications"},{"issue":"20","key":"10.3233\/JIFS-221245_ref9","doi-asserted-by":"crossref","first-page":"21133","DOI":"10.1007\/s11042-016-4054-2","article-title":"Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme","volume":"76","author":"Benrhouma","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-221245_ref10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.jvcir.2017.09.017","article-title":"Trlh: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique","volume":"50","author":"Haghighi","year":"2018","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"3","key":"10.3233\/JIFS-221245_ref11","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","article-title":"Non-uniform watermark sharing based on optimal iterative btc for image tampering recovery","volume":"25","author":"Qin","year":"2018","journal-title":"IEEE Multi Media"},{"issue":"4","key":"10.3233\/JIFS-221245_ref12","doi-asserted-by":"crossref","first-page":"4197","DOI":"10.1007\/s11042-017-5454-7","article-title":"Block truncation coding based effective watermarking scheme for image authentication with recovery capability","volume":"78","author":"Singh","year":"2019","journal-title":"Multimedia Tools and Applications"},{"issue":"47","key":"10.3233\/JIFS-221245_ref13","doi-asserted-by":"crossref","first-page":"35519","DOI":"10.1007\/s11042-019-07971-w","article-title":"Image tamper detection and self-recovery using multiple median watermarking","volume":"79","author":"Rajput","year":"2020","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"10.3233\/JIFS-221245_ref14","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s00530-021-00751-3","article-title":"A novel pixel-wise authentication-based self-embedding fragile watermarking method","volume":"27","author":"Gul","year":"2021","journal-title":"Multimedia Systems"},{"key":"10.3233\/JIFS-221245_ref15","first-page":"277","article-title":"A secure image authentication scheme with tamper localization and recovery","volume":"340","author":"Neena Raj","year":"2021","journal-title":"Fuzzy Systems and Data Mining VII: Proceedings of FSDM 2021"},{"issue":"3","key":"10.3233\/JIFS-221245_ref16","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.3390\/app11031146","article-title":"Self-embedding fragile watermarking scheme to detect image tampering using ambtc and opap approaches","volume":"11","author":"Kim","year":"2021","journal-title":"Applied Sciences"},{"issue":"2","key":"10.3233\/JIFS-221245_ref19","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.patcog.2007.06.003","article-title":"Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery","volume":"41","author":"Chang","year":"2008","journal-title":"Pattern Recognition"},{"issue":"5","key":"10.3233\/JIFS-221245_ref20","doi-asserted-by":"crossref","first-page":"395","DOI":"10.4103\/0256-4602.103173","article-title":"An image encryption process based on chaotic logistic map","volume":"29","author":"Mandal","year":"2012","journal-title":"IETE Technical Review"},{"issue":"3","key":"10.3233\/JIFS-221245_ref21","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1137\/S0036139900368844","article-title":"Mathematical models for local nontexture inpaintings","volume":"62","author":"Shen","year":"2002","journal-title":"SIAM Journal on Applied Mathematics"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-221245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T05:56:53Z","timestamp":1769666213000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-221245"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,9]]},"references-count":16,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-221245","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,9]]}}}