DOI: 10.1007/978-3-540-69295-9_50
|View full text |Cite
|
Sign up to set email alerts
|

A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Advantage Parity-check quantization (or similar works) is used in a great many research works. [14][15][16][17] As for Ref. [16], it embeds the data in least significant bits (LSBs) of the host image.…”
Section: Embedding Methods (Ie How To Embed) and Ourmentioning
confidence: 99%
See 3 more Smart Citations
“…Advantage Parity-check quantization (or similar works) is used in a great many research works. [14][15][16][17] As for Ref. [16], it embeds the data in least significant bits (LSBs) of the host image.…”
Section: Embedding Methods (Ie How To Embed) and Ourmentioning
confidence: 99%
“…First, the two studies 12,13 are authentication methods without considering the issue of recovery, but ours is equipped with both authentication and recovery abilities. As for other semifragile watermarking methods [14][15][16][17][18] with both authentication and recovery abilities, to describe the difference between ours and those methods, each watermarking algorithm is divided into major substeps (from the perspective of methodology and system design), and then a comparison is made. The differences are described below.…”
Section: Comparison With Other Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…With this aim, many watermarked methods for image authentication have been proposed over the last decade. [1][2][3]10,12 In such methods, authentication information is imperceptibly embedded into images.…”
Section: Introductionmentioning
confidence: 99%