2005
DOI: 10.1007/978-3-540-31805-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Alteration-Locating Authentication Watermarking for Binary Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0
5

Year Published

2005
2005
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 33 publications
(44 citation statements)
references
References 16 publications
0
39
0
5
Order By: Relevance
“…The performance of the proposed algorithm can be compared with the previous method [2]. The localization accuracy in the proposed method has been improved to the block-size of 40×40 pixels.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of the proposed algorithm can be compared with the previous method [2]. The localization accuracy in the proposed method has been improved to the block-size of 40×40 pixels.…”
Section: Resultsmentioning
confidence: 99%
“…For such images, hiding sufficient amount of data for secure authentication without creating visible distortion is difficult. The previous method for localization in binary document images has been reported in [2]. In this method, the original image is divided into many sub-images and each sub-image is watermarked independently.…”
Section: Introductionmentioning
confidence: 99%
“…Block-wise: Divide the cover image into blocks and modify some characteristic of each block to hide the data. Some papers suggest changing the parity or the quantization step of the number of black pixels in each block [7,8]. Others suggest flipping one specific pixel in the block with m pixels to insert ⎣ ⎦ ) 1 ( log 2 + m bits [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…The challenging problem is how to divide the binary image into two parts such that the above idea of embedding the authentication signature can be applied. Cryptography-based authentication watermarking schemes were proposed for binary images in [12,13]. Kim et al modified few bits in a binary image for embedding the authentication signature and the positions of those bits were known in both embedding and detection processes [12].…”
Section: Motivationmentioning
confidence: 99%
“…However this method of simple partitioning the binary image results in poor visual quality. In [13], Kim et al shuffled the binary image and then partitioned the shuffled image into two equal parts. Authentication signature was computed from one part and then embedded into the other part using the block-wise data hiding technique developed in [7].…”
Section: Motivationmentioning
confidence: 99%