2019
DOI: 10.30534/ijiscs/2019/36822019
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Method for Detection and Localization of Tampering

Abstract: Digital transmission of sensitive images and documents over unsecure networks, such as the Internet, has become a general practice. As a result, the digital content has become vulnerable to intentional and unintentional modifications during transmission. A system that combines linear interpolation for tamperdetection and localization that provide security to exchanged data is the main concern. The algorithm is based on hash based representation of such image and uses discrete wavelet transform method to carry … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Figure 18 a and 18 b show the framework for data embedding and extraction in authentication-based watermarking schemes. The state-of-the-art techniques along with evaluation parameters, pros, and cons of authentication-based watermarking techniques for medical image watermarking have been presented in Table 8 [ 30 , 41 , 44 , 51 , 61 , 63 , 68 , 79 , 81 , 85 ]. Further in Table 9 we present the comparative analysis of several existing schemes in terms of PSNR, SSIM, and computational complexity.…”
Section: State Of the Art Watermarking Techniques For Medical Imagementioning
confidence: 99%
See 1 more Smart Citation
“…Figure 18 a and 18 b show the framework for data embedding and extraction in authentication-based watermarking schemes. The state-of-the-art techniques along with evaluation parameters, pros, and cons of authentication-based watermarking techniques for medical image watermarking have been presented in Table 8 [ 30 , 41 , 44 , 51 , 61 , 63 , 68 , 79 , 81 , 85 ]. Further in Table 9 we present the comparative analysis of several existing schemes in terms of PSNR, SSIM, and computational complexity.…”
Section: State Of the Art Watermarking Techniques For Medical Imagementioning
confidence: 99%
“… • It is not able to localize and recover the tamper. - Saju and Sreenimol [ 68 ] Hash Linear Interpolation, DWT Subjective evaluation. • Tamper detection and authentication.…”
Section: State Of the Art Watermarking Techniques For Medical Imagementioning
confidence: 99%