2013
DOI: 10.1007/s11042-012-1317-4
|View full text |Cite
|
Sign up to set email alerts
|

A semi-fragile image watermarking algorithm with two-stage detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…This decision depends on the type of authentication methods for digital image forensic [4]. Two main types of authentication methods in digital image forensic have been explored in the literature: (1) active methods [5][6][7][8][9][10], and (2) passive methods [2,[11][12][13][14].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This decision depends on the type of authentication methods for digital image forensic [4]. Two main types of authentication methods in digital image forensic have been explored in the literature: (1) active methods [5][6][7][8][9][10], and (2) passive methods [2,[11][12][13][14].…”
Section: Related Workmentioning
confidence: 99%
“…In the past few years, digital watermarking has been applied to authenticate and localise tampered regions within images [9,10,16,17]. Fragile and semi-fragile digital watermarking techniques are often utilised for image authentication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The watermark embedding method in [12] is used to embed the recovery watermark. The significant watermark S 0 i and detail watermark D 0 i are embedded in the 2 nd -7 th and 8 th -12 th quantized DCT coefficients in the selected blocks by the user key key 2 .…”
Section: Watermark Embeddingmentioning
confidence: 99%
“…X i (i = 1, 2, …, N) is the DCT matrix for watermark embedding. The detail of watermark embedding can be referred to the embedding method of CAW (collage attack watermark) in [12]. P = {p t, i | t = 1, 2, i = 1, 2, …, N} is the embedding position.…”
Section: Watermark Embeddingmentioning
confidence: 99%