2019
DOI: 10.1007/s40998-019-00275-7
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…Despite the importance of digital images, the ease of tampering with their content has caused a lot of criminal events relevant to confidentiality, integrity, and accessibility of the transmitted images. Therefore, many researchers have developed different approaches for authentication of digital images [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Despite the importance of digital images, the ease of tampering with their content has caused a lot of criminal events relevant to confidentiality, integrity, and accessibility of the transmitted images. Therefore, many researchers have developed different approaches for authentication of digital images [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…We can leverage from these statistical results to verify whether an image has been tampered or not. The second type of approaches is watermarkbased authentication schemes [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. This type of approaches will first produce a fragile watermark consisting of authentication code generated from some key information of the original image, and then utilize the embedding techniques [19][20][21] to embed the authentication code into the original image to form a marked one.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations