2010
DOI: 10.1016/j.compeleceng.2009.12.003
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and recovery of images using multiple watermarks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(27 citation statements)
references
References 14 publications
0
26
0
1
Order By: Relevance
“…For semi-fragile self-recoverable watermarking, some popular schemes have been developed [3,4,11,15,21,28,33,43]. These schemes can be classified into two categories based on the methods and functionalities of embedded watermarks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For semi-fragile self-recoverable watermarking, some popular schemes have been developed [3,4,11,15,21,28,33,43]. These schemes can be classified into two categories based on the methods and functionalities of embedded watermarks.…”
Section: Related Workmentioning
confidence: 99%
“…If a watermarked image suffers from modification, the self-recoverable watermarking scheme can localize the tampered region and recover the region by using hidden information in the image [3,4,9,11,12,14,15,18,19,21,22,27,28,31,33,42,43]. The self-recoverable fragile watermarking scheme does not need to tolerate content-preservation manipulations.…”
Section: Introductionmentioning
confidence: 99%
“…Active authentication methods are further classified into two types digital watermarking and digital signatures [6][7][8]. Digital water marks are embedded into the images at the time of image acquisition or in processing stage and digital signatures embed some secondary information, usually extracted from image, at the acquisition end into the image .A lot of work has been carried in both digital signatures [9][10][11][12][13] and digital watermarking [14][15][16][17][18]. The main drawback of these approaches remains that they are to be inserted into the images at the time of recording using special equipments thus prior information about image becomes indispensable.…”
Section: Active Authenticationmentioning
confidence: 99%
“…There are a variety of different methods for watermark embedding and data recovery, such as discrete cosine transform [10,11], multiple watermarks [12], and source-channel coding [13].…”
Section: Introductionmentioning
confidence: 99%