2003
DOI: 10.1109/tmm.2003.809729
|View full text |Cite
|
Sign up to set email alerts
|

Circular interpretation of bijective transformations in lossless watermarking for media asset management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
208
0

Year Published

2003
2003
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 369 publications
(208 citation statements)
references
References 14 publications
0
208
0
Order By: Relevance
“…The amount of authentication information used for the tamper detection is subject to the constraint of condition (4). Therefore, those lossless watermarking approaches with low capacity 7,8,12 are unable to provide sufficient localization accuracy. The property of retrievability is the key to the success of tamper localization.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The amount of authentication information used for the tamper detection is subject to the constraint of condition (4). Therefore, those lossless watermarking approaches with low capacity 7,8,12 are unable to provide sufficient localization accuracy. The property of retrievability is the key to the success of tamper localization.…”
Section: Discussionmentioning
confidence: 99%
“…In the prediction-error based algorithm of Thodi et al, 13 a slight modification of image data may lead to drastic change of the context used for prediction, which leads to failure of watermark extraction and restoration. The discussion above indicates that many current lossless watermarking methods [7][8][9][10][11][12][13] are not good candidates for embedding local authentication information directly into the watermark payload.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The advantages of using watermarking include enabling authentication information such as the metadata to be embedded into the medical images as visually unperceivable watermark payload and providing continuous authenticity and integrity protection of the images beyond the point of internal network. A number of digital watermarking techniques for medical images have been reported [2][3][4][5][6][7][8][9][10][11][12][13][14][15]. These watermarking techniques can be broadly categorized into non-reversible [3,4] and reversible watermarking [2,[5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] in the literature where reversible watermarking has been more widely implemented.…”
Section: Introductionmentioning
confidence: 99%