2022
DOI: 10.1002/cpe.6897
|View full text |Cite
|
Sign up to set email alerts
|

A novel Frei‐Chen based fragile watermarking method for authentication of an image

Abstract: In recent years, the protection of the intellectual property rights of digital media has become a considerable issue. Especially using digital image editing tools has made it very easy and fast to manipulate images. Therefore, manipulation detection of digital images has become a necessity. This article presents a novel Frei‐Chen based self‐embedding fragile watermarking technique implemented to 3×3 blocks for image manipulate detection. The block key and the Frei‐Chen based block feature are calculated from t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Methods based on standard cryptography have been applied in this group [4]. Fragile watermarking-based methods have also been applied in this group, such as the method proposed based on the Frei-Chen edge mask [5], which provides excellent image quality with watermarking and clearly reveals tampered regions. Another example of a fragile watermarking-based method is a method combining discrete wavelet transform (DWT), singular value decomposition (SVD) and discrete cosine transform (DCT) [6].…”
Section: Related Workmentioning
confidence: 99%
“…Methods based on standard cryptography have been applied in this group [4]. Fragile watermarking-based methods have also been applied in this group, such as the method proposed based on the Frei-Chen edge mask [5], which provides excellent image quality with watermarking and clearly reveals tampered regions. Another example of a fragile watermarking-based method is a method combining discrete wavelet transform (DWT), singular value decomposition (SVD) and discrete cosine transform (DCT) [6].…”
Section: Related Workmentioning
confidence: 99%
“…LL2, LH2, HL2, HH2 = DWT(LL1). (12) 6. Apply 2-level DWT using Haar wavelet to the gray-level watermarked image, I Out w , to obtain N∕2 × N∕2 sized LL2 w , HL2 w , LH2 w , HH2 w and N × N sized HL1 w , LH1 w , HH1 w sub-bands:…”
Section: Watermark Extractingmentioning
confidence: 99%
“…Depending on the application scenario, digital image watermarking methods may be classified as robust, fragile, and semi‐fragile 7 . Fragile and semi‐fragile watermarking methods are mainly used for image authentication, integrity verification, and identification of tampering and localization, in which watermarks are designed to be sensitive to image modifications 8‐12 . Robust watermarking methods are used for fingerprinting, protecting the ownership or copyright, copy control, and broadcast monitoring applications, where the watermarks are designed to be resilient to various noisy, geometric, and non‐geometric attacks 13 …”
Section: Introductionmentioning
confidence: 99%