Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.
DOI: 10.1109/isspit.2005.1577129
|View full text |Cite
|
Sign up to set email alerts
|

Binary document image watermarking for secure authentication using perceptual modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 13 publications
(17 reference statements)
0
2
0
Order By: Relevance
“…There is an urgent demand for techniques to protect the original digital data and to prevent unauthorized duplication or tampering [1] . Digital watermarking and data hiding have been applied in a large ranges of digital media applications, including copyright protection, copy control, authentication.…”
mentioning
confidence: 99%
“…There is an urgent demand for techniques to protect the original digital data and to prevent unauthorized duplication or tampering [1] . Digital watermarking and data hiding have been applied in a large ranges of digital media applications, including copyright protection, copy control, authentication.…”
mentioning
confidence: 99%
“…The technique in [21] caused serious distortion. Another scheme is proposed in [101] which is an improvement over [21] [65,67,70,88,93,104,115,118,120]. These schemes also follow a similar procedure to hide information in binary images.…”
Section: Pixel Flipping Technique For Text and Graphic Imagesmentioning
confidence: 99%