2005
DOI: 10.1016/j.patcog.2005.02.007
|View full text |Cite
|
Sign up to set email alerts
|

A hierarchical digital watermarking method for image tamper detection and recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
115
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 255 publications
(116 citation statements)
references
References 16 publications
0
115
0
1
Order By: Relevance
“…These requirements are being achieved by different conventional measures, which are thought to be incapable of providing the required security of the electronic radiology information in the PACS/RIS-based teleradiology [5][6][7]. On the other hand, recent studies show the possibility of using digital watermarking for improving security in teleradiology [8][9][10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…These requirements are being achieved by different conventional measures, which are thought to be incapable of providing the required security of the electronic radiology information in the PACS/RIS-based teleradiology [5][6][7]. On the other hand, recent studies show the possibility of using digital watermarking for improving security in teleradiology [8][9][10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…The fragile watermarking techniques, which not only locate the fake region, but also recover the tampering region, are more practically and comprehensively applied. To accurately identify the tampered blocks, Lin et al [6] proposed a hierarchical digital watermarking scheme for tamper detection and recovery, and he used a 3-level hierarchical structure to locate the tampered regions, but there was no second chance to recover tampered blocks whose watermark bits embedded in the other block were destroyed. To overcome this problem, Qian [7] hided the restoration-bits into the 3-LSB layers of the host image to improve the reconstructed image quality, the quality of recovered image was improved, but the quality of watermarked image decreased due to the increased watermark payload.…”
Section: Introductionmentioning
confidence: 99%
“…This tampered image can mislead decision making in the case of courtroom evidence, insurance claims, and journalistic photography. Many image authentication methods through fragile watermarking have been proposed [1,2,3]. Among them, several methods [2,3] not only can detect the tampered areas but also can recover the shape previous to damage.…”
Section: Introductionmentioning
confidence: 99%
“…Many image authentication methods through fragile watermarking have been proposed [1,2,3]. Among them, several methods [2,3] not only can detect the tampered areas but also can recover the shape previous to damage. In particular using the recovery property we can know the intention of attackers and we argue that it is enough to obtain the recognizable image.…”
Section: Introductionmentioning
confidence: 99%